Explore hardware exploitation techniques for the ESP32 in this Black Hat conference talk. Delve into methodical approaches to bypass security features through physical access and low-cost hardware methods. Learn about voltage glitching, analog side-channels, micro-soldering, and reverse engineering. Examine the ESP32's vulnerabilities, including Secure Boot, Flash Encryption, and OTP Fuses. Discover power analysis techniques, decryption methods, and their impact on device security. Gain insights into responsible disclosure practices and understand the broader implications of these exploits in the field of embedded systems security.
Overview
Syllabus
Intro
About ESP32
Code review
Secure Boot
Reverse Boot
Flash Encryption
OTP Fuses
ReadWrite Protection
Power Analysis
Results
Decryption
Conclusion
Vendors Responsible Disclosure
The Impact
Final Conclusion
Taught by
Black Hat