Ensuring IoT Security Against Side Channel Attacks for ESP32
ESP32 boards are the building blocks for many IoT devices today, with applications spanning smart home, healthcare, IIoT and beyond. Espressif have held the number one position for market share in Wi-Fi MCUs, worldwide, for the past 6 years. They come with reasonable security functionality, as the latest C3/C6 products both include secure boot and flash encryption among other features.
A hardware vulnerability has been identified in the ESP32-C3 and ESP32-C6 chips. This vulnerability allows an attacker to compromise the secure boot and flash encryption, meaning sensitive data such as passwords or cryptographic keys can be extracted.
This attack uses a technique known as Correlation Power Analysis, a form of side channel attack, to extract the encryption key from the first flash block. Attackers can then use a buffer overflow exploit using a fault injection technique in ROM code to load and execute shellcode in the internal memory; bypassing the device secure boot.
To read the full article, click here
Related Semiconductor IP
- Ultra Ethernet MAC & PCS 100G/200G/400G/800G
- Ethernet PCS 100G/200G/400G/800G/1.6T
- Ethernet MAC 100G/200G/400G/800G/1.6T
- Junction Over-Temperature Detector with Linear Centigrade-to-Voltage Output - X-FAB XT018
- Performance P570 Gen 3
Related Blogs
- Evaluating the Side Channel Security of Post-Quantum Hardware IP
- IoT Security: Gone in a Wink
- How to Secure IoT Edge Device from Multiple Attacks?
- Linley IoT Conference: Security and...Well, Just Security
Latest Blogs
- Inside the SiFive Performance™ P570 Gen 3: High Performance Efficiency for Next-Generation Consumer and Commercial Applications
- What the steam engine can teach us about modern chip design
- Automotive silicon in the era of AI, functional safety, and cybersecurity
- JPEG XS Officially Joins GenICam, The Machine Vision Standard Managed By EMVA
- Beyond PCIe Compliance: Why Stress Testing Is Crucial for Edge AI Deployments