Explore an in-depth hardware security evaluation of the ESP32-V3 microcontroller in this 38-minute Black Hat conference talk. Delve into the researchers' attempts to extract the firmware encryption key and decrypt the encrypted flash content of this widely used chip, present in millions of IoT devices, mobile applications, and hardware wallets. Learn about the vulnerabilities discovered in the ESP32-V1 chip family through a 2019 fault injection attack, and understand how Espressif's subsequent security patches led to the creation of the hardened ESP32-V3 silicon revision. Gain insights into the methodologies and techniques employed by the presenters, Karim Abdellatif, Olivier Hériveaux, and Adrian Thillard, as they assess the security measures of this critical component in modern electronics.
Overview
Syllabus
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
Taught by
Black Hat