Tra da hacking #9 2020

Practical Electrical Glitching Attacks

Abstract

This research presents an in-depth analysis and practical exploitation of hardware fault injection attacks using VCC glitching on the ESP32 platform to recover cryptographic keys from traces obtained during induced fault conditions.

The attack leverages precise manipulation of the power supply by momentarily pulling VCC to GND for nanosecond-scale intervals, causing transient malfunction of the integrated circuit and enabling attacker-controlled fault scenarios.

The study demonstrates the application of VCC glitching techniques to:

- Bypass hardware debug protection mechanisms such as JTAG and SWD

- Circumvent secure boot enforcement - Bypass One-Time Programmable (OTP) memory protections (eFuse) to extract sensitive cryptographic keys

Authors

Conference Details

Conference
Tra da hacking #9
Year
2020
Published Date
October 11, 2020

References