1
2
submitted 5 months ago* (last edited 5 months ago) by XTL@sopuli.xyz to c/embedded@programming.dev

Hardware and embedded software engineer Kévin Courdesses has replicated research into breaking the flash encryption on selected Espressif ESP32 microcontrollers — including the ESP32-C3 and ESP32-C6 — using side-channel attacks to extract data and even bypass secure boot functionality.

"I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 (Abdellatif et al, 2023) paper," Courdesses explains. "This paper is about breaking the firmware encryption feature of the ESP32 SoC [System on Chip] using a side-channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results. To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel."

2
9
submitted 5 months ago* (last edited 5 months ago) by ericjmorey@programming.dev to c/embedded@programming.dev

More Discussion on Hacker News:

New RISC-V emulator for Computer Science education (github.com/gboncoffee)

Just released EGG, an emulator created for teaching Assembly and microprocessors (designed to suit the needs of the Microprocessors classes, at Universidade Federal do Paraná, Brazil). The emulator will support multiple architetures in the future, but currently only RISC-V is implemented.

The egg package itself provides only an interface for interacting with machines, thus supporting different architeture backends. Currently, the only backend implemented is egg/riscv, which implements a RISC-V IM 32 bits machine. A MIPS backend is coming soon.

egg/assembler also provides a small library for creating assemblers, and the support for EGG's debugger.

3
21
4
2
5
1
6
1
7
1

Embedded

229 readers
1 users here now

We talk and share about anything Embedded, including;

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 1 year ago
MODERATORS