Unlock the Door to my Secrets, but dont Forget to Glitch (camp2023)

Published: Aug. 19, 2023, noon

b'Microcontrollers are used in numerous applications and even in security-relevant areas, for example in form of hardware security tokens or crypto wallets.\\nHence, the non-volatile flash memory of microcontrollers contains sensitive assets such as cryptographic secrets or intellectual property, that need to be protected from being read out by adversaries.\\nIn order to prevent illegal extraction through the integrated debug interface, dedicated protection features are in place.\\n\\nIn this talk, we take a look at an attack vector that we call *flash erase suppression*. This attack vector leverages that many microcontrollers allow to deactivate their debug interface protection under the condition that the entire flash memory is erased first.\\nThe attack suppresses this mass erase with a glitch whereby its contents are preserved and accessible through the activated debug interface.\\nThis type of attack was first presented by Schink et al. at CHES 2021, but only received little attention so far.\\n\\nThe talk provides an introduction to this attack vector and gives a foretaste of a comprehensive analysis that will be published soon.\\nThe attack will be demonstrated live on stage with an exemplary microcontroller.\\nabout this event: https://pretalx.c3voc.de/camp2023/talk/AS9MQY/'