On 06/06/2018 08:50 PM, Philipp Klaus Krause wrote: > See https://www.aisec.fraunhofer.de/en/FirmwareProtection.html for > some research on breaking STM32 readout protection published in > January.
For what it's worth, STMicroelectronics claims that the attack described in this paper "affects only the STM32F0 and is not successful in all other series" [1]. Whether you believe them or not is up to you. Of note, the authors of that paper themselves do not claim the attack works on anything else than the STM32F0. (But of course, just because *this* attack (presumably) does not work on the STM32F103, it does not mean that nobody can ever come up with a successful attack on that chip...) Damien [1] https://community.st.com/thread/46432-hacking-readout-protection-on-stm32#comment-181542
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users