mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#faultinjection

0 posts0 participants0 posts today

Currently trying to solder probes to a mainboard's RAM DIMM connectors to try memory fault injection. Soldering 100+ wires is a huge pain, would anyone know of an existing interface/PCB with pogo pins/something that could make my life simpler?

Or are there tricks to batch-solder such a quantity of small wires?

Great talk by Aedan Cullen (@aedancullen) at #38c3 on breaking security on the #RP2350 by glitching the OTP VDD.

streaming.media.ccc.de/38c3/re

I expect the bus between the state machine and OTP is like Wishbone or M68K and has a request and an acknowledge, and the data is latched on the ACK. No ACK? Guard word stays in the latch.

streaming.media.ccc.deRelive: Hacking the RP2350 – 38C3: Illegal Instructions StreamingLive streaming from the 38th Chaos Communication Congress

The fault injection library (PicoGlitcher, Chipwhisper etc) was just updated with the results of me playing around with my PicoGlitcher yesterday evening. This info comes from actual glitches against a so-far unnamed IoT device based on the STM32F412.

github.com/MKesenheimer/fault-

Summary:

1) No, it's not realistic to glitch ReadMemory to read out the internal flash from these devices with the known methods.

2) Still fun though and why not study the v3.1 bootloader intensely?

GitHubfault-injection-library/stm32f412-glitching at master · MKesenheimer/fault-injection-libraryPython library to perform fault-injection attacks on microcontrollers - MKesenheimer/fault-injection-library

:twitter:​ finally seems to be flat-lining, trying out this new mastodon thing...

#introduction, for peeps I've not met prior via my bird app handle @ntpopgetdope. I'm a vulnerability researcher that's worked in the industry professionally for >4yrs

My background stems from an obsession with #windowsinternals & the vastly underrated 'HAL.dll'. These days I'm into baseband vuln research working on obscure hardware, architectures & attacks. Love chatting about all things:
#fpga #uefi #baseband #faultinjection #openhardware #embeddedelectronics #pcbdesign and #cats !

Currently with the @InterruptLabs crew, a boutique vulnerability research & exploit development firm in the UK.