On Fri, Mar 28, 2025 at 07:04:05AM -0700, ron minnich wrote:
> search for: keysight rp2350 hardware attacks
> 
> (I'm done including links :-)
> 
> Short form: it's getting easier by the day to put together glitching
> hardware, for under $1000, and uncover those keys!

[From the PR departement] This demonstrates once more:
        - That security relies first on simplicity (despite the
conclusion, there is a mention about software too, i.e. compilers:
"Due to an unlucky arrangement of instructions emitted by the
compiler, injecting a fault which skips one out of two very specific
instructions confuses the chip into rebooting to the hazardous boot
type".);
        - That security has a cost and to maintain efficiency,
        strong security has to be done only once, and that it would
be more secure for a task, verified, to execute once on a dedicated
core than having to verify it at each running slot of time, having
verified too that it had not been altered while sleeping and that the
context on the core or the caches have not been "polluted" by a
concurrent task.

On the obvious side---it will probably not be a scoop to a lot of
people---, I discovered, while working on the driver for the
RTL 8125 and al. NICs, that there are instructions to allow
to turn off the blinking led showing that there are network exchanges...

All in all, trusting something that one doesn't build entirely (from
hardware to software)---it may exhibit then errors but from involuntary
faults---is, at best, naivety.
-- 
        Thierry Laronde <tlaronde +AT+ kergis +dot+ com>
                     http://www.kergis.com/
                    http://kertex.kergis.com/
Key fingerprint = 0FF7 E906 FBAF FE95 FD89  250D 52B1 AE95 6006 F40C

------------------------------------------
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/Tbd230a8f010208d8-M484bb3312349d42903435fed
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription

Reply via email to