Protecting Wi-Fi chipsets with hardware-based security cores
Embedi security researcher Denis Selianin recently disclosed a slew of major vulnerabilitiesthat impacted one of the most popular Wi-Fi chipsets on the market. According to various media reports, the affected SoC can be found in devices such as the Sony PlayStation 4, Xbox One, Microsoft Surface laptops, Samsung Chromebooks, Samsung Galaxy J1 smartphones and Valve SteamLink cast devices.
As Selianin notes in a detailed blog post, multiple techniques were used to remotely compromise devices packing the chip by exploiting a number of bugs in the SoC. These include closely examining the interaction between the Wi-Fi SoC and driver, firmware analysis, as well as static and dynamic (ThreadX runtime structures recovery & dynamic firmware instrumentation) firmware file analysis. In addition, Selianin hunted for bugs using fuzzing, engaged in basic ThreadX block pool overflow exploitation, exploited AP device driver vulnerabilities and even executed code on SteamLink’s application processor.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- Is Hardware-Based Security The Right Answer to Cloud Security?
- Rambus CryptoManager Root of Trust Cores Certified ASIL-B/D Ready for Enhanced Security in Automotive Applications
- 5 Strategies for Protecting Your Advanced SoC Designs from Security Breaches
- Setting a Foundation for Security with ReRAM
Latest Blogs
- Upgrade the Raspberry Pi for AI with a Neuromorphic Processor
- Securing The Road Ahead: MACsec Compliant For Automotive Use
- Beyond design automation: How we manage processor IP variants with Codasip Studio
- Cadence Extends Support for Automotive Solutions on Arm Zena Compute Subsystems
- The Role of GPU in AI: Tech Impact & Imagination Technologies