Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the
Author: Nicolas Oberli
SWD part 3 – SWO and nRST
The SWD interface does not only consist of the SWDIO and SWDCK lines, but also has optional signals used in more specific cases. In this
Power (Analysis) to the People
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
SWD part 2 : the MEM-AP
After part 1, you should now be familiar with the basics of SWD. We finished the article at the gates of an important part of
SWD – ARM’s alternative to JTAG
For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for
Physically Unclonable Functions in Practice
Introduction Physically Unclonable Functions (PUFs) are, according to wikipedia a physically-defined “digital fingerprint” that serves as a unique identity for a semiconductor device such as