Ensuring IoT Security Against Side Channel Attacks for ESP32
ESP32 boards are the building blocks for many IoT devices today, with applications spanning smart home, healthcare, IIoT and beyond. Espressif have held the number one position for market share in Wi-Fi MCUs, worldwide, for the past 6 years. They come with reasonable security functionality, as the latest C3/C6 products both include secure boot and flash encryption among other features.
A hardware vulnerability has been identified in the ESP32-C3 and ESP32-C6 chips. This vulnerability allows an attacker to compromise the secure boot and flash encryption, meaning sensitive data such as passwords or cryptographic keys can be extracted.
This attack uses a technique known as Correlation Power Analysis, a form of side channel attack, to extract the encryption key from the first flash block. Attackers can then use a buffer overflow exploit using a fault injection technique in ROM code to load and execute shellcode in the internal memory; bypassing the device secure boot.
To read the full article, click here
Related Semiconductor IP
- Embedded Hardware Security Module for Automotive and Advanced Applications
- Hardware Security Module
- Voltage Detector
- Power Switch
- Low Dropout Regulator (LDO)
Related Blogs
- IoT Security: Gone in a Wink
- How to Secure IoT Edge Device from Multiple Attacks?
- Linley IoT Conference: Security and...Well, Just Security
- Security for IoT Is a Requirement, Not a Choice
Latest Blogs
- RISC-V Processor Design - Free YouTube Course by Maven Silicon
- Why Secure Boot is Your Network’s Best Friend (And What BlackTech Taught Us)
- How PCIe® Technology is Connecting Disaggregated Systems for Generative AI
- Future of PQC on OpenTitan
- HiFive Premier P550 Development Boards with Ubuntu Now Available—With Great Reviews and a Lower Price