Главная
Study mode:
on
1
Intro
2
About ESP32
3
Code review
4
Secure Boot
5
Reverse Boot
6
Flash Encryption
7
OTP Fuses
8
ReadWrite Protection
9
Power Analysis
10
Results
11
Decryption
12
Conclusion
13
Vendors Responsible Disclosure
14
The Impact
15
Final Conclusion
Description:
Explore hardware exploitation techniques for the ESP32 in this Black Hat conference talk. Delve into methodical approaches to bypass security features through physical access and low-cost hardware methods. Learn about voltage glitching, analog side-channels, micro-soldering, and reverse engineering. Examine the ESP32's vulnerabilities, including Secure Boot, Flash Encryption, and OTP Fuses. Discover power analysis techniques, decryption methods, and their impact on device security. Gain insights into responsible disclosure practices and understand the broader implications of these exploits in the field of embedded systems security.

Fatal Fury on ESP32 - Time to Release Hardware Exploits

Black Hat
Add to list
0:00 / 0:00