Ensuring IoT Security Against Side Channel Attacks for ESP32
ESP32 boards are the building blocks for many IoT devices today, with applications spanning smart home, healthcare, IIoT and beyond. Espressif have held the number one position for market share in Wi-Fi MCUs, worldwide, for the past 6 years. They come with reasonable security functionality, as the latest C3/C6 products both include secure boot and flash encryption among other features.
A hardware vulnerability has been identified in the ESP32-C3 and ESP32-C6 chips. This vulnerability allows an attacker to compromise the secure boot and flash encryption, meaning sensitive data such as passwords or cryptographic keys can be extracted.
This attack uses a technique known as Correlation Power Analysis, a form of side channel attack, to extract the encryption key from the first flash block. Attackers can then use a buffer overflow exploit using a fault injection technique in ROM code to load and execute shellcode in the internal memory; bypassing the device secure boot.
To read the full article, click here
Related Semiconductor IP
- ISO/IEC 7816 Verification IP
- 50MHz to 800MHz Integer-N RC Phase-Locked Loop on SMIC 55nm LL
- Simulation VIP for AMBA CHI-C2C
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
Related Blogs
- IoT Security: Gone in a Wink
- How to Secure IoT Edge Device from Multiple Attacks?
- Linley IoT Conference: Security and...Well, Just Security
- Security for IoT Is a Requirement, Not a Choice
Latest Blogs
- A Comparison on Different AMBA 5 CHI Verification IPs
- Cadence Recognized as TSMC OIP Partner of the Year at 2025 OIP Ecosystem Forum
- Accelerating Development Cycles and Scalable, High-Performance On-Device AI with New Arm Lumex CSS Platform
- Desktop-Quality Ray-Traced Gaming and Intelligent AI Performance on Mobile with New Arm Mali G1-Ultra GPU
- Powering Scale Up and Scale Out with 224G SerDes for UALink and Ultra Ethernet