Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a DEF CON conference talk that delves into the vulnerabilities of eFuse-based memories, commonly used for storing sensitive data like encryption keys and passwords. Learn how physical properties of these memory types can be exploited through various techniques, from basic chip decapsulation using household items to advanced analysis with Scanning Electron Microscopes (SEM). Follow along as security researchers demonstrate the complete process of extracting encrypted information from eFuse memories, ultimately compromising the confidentiality of encrypted flash memory by obtaining encryption keys. Understand why the industry's reliance on eFuse-based storage for protecting debugging interfaces and securing encryption keys may need reevaluation in light of advancing technological capabilities and evolving threat actor methodologies.