Unlock the Door to my Secrets, but don’t Forget to Glitch
In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection to be deactivated after wiping the entire flash memory. The flash erase suppression attack exploits this feature by glitching the mass erase,...
Main Authors: | Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2024-03-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/11422 |
Similar Items
-
IOMMU protection against I/O attacks: a vulnerability and a proof of concept
by: Benoît Morgan, et al.
Published: (2018-01-01) -
Time series-based detection and impact analysis of firmware attacks in microgrids
by: Ioannis Zografopoulos, et al.
Published: (2022-11-01) -
Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
by: Huilong Jiang, et al.
Published: (2022-10-01) -
Who Watches the Watchers: Attacking Glitch Detection Circuits
by: Amund Askeland, et al.
Published: (2023-12-01) -
Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
by: Akashdeep Bhardwaj, et al.
Published: (2024-03-01)