Hardware and embedded software engineer Kévin Courdesses has replicated research into breaking the flash encryption on selected Espressif ESP32 microcontrollers — including the ESP32-C3 and ESP32-C6 — using side-channel attacks to extract data and even bypass secure boot functionality.

“I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 (Abdellatif et al, 2023) paper,” Courdesses explains. “This paper is about breaking the firmware encryption feature of the ESP32 SoC [System on Chip] using a side-channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results. To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel.”

No comments yet!

Embedded

!embedded@programming.dev

Create post

We talk and share about anything Embedded, including;

  • PCB Design.
  • Hardware architecture.
  • Embedded platforms and chipsets.
  • Protocols.
  • Embedded programming.
  • Digital Logic.
  • FPGA.
  • VHDL, System Verilog…etc.
  • Intel Quartus, AMD Xilinx…etc.
  • DIP, DSP.

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

Community stats

  • 1

    Monthly active users

  • 7

    Posts

  • 4

    Comments