Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the

Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the
The SWD interface does not only consist of the SWDIO and SWDCK lines, but also has optional signals used in more specific cases. In this
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
Introduction Ph0wn is a CTF (Capture The Flag) competition focused on IoT and embedded devices happening in Sophia Antipolis, France. We were asked by the