Explore a detailed security analysis of the Raspberry Pi RP2350 microcontroller in this conference talk from the 38th Chaos Communication Congress (38C3). Learn about the discovery and exploitation of vulnerabilities in the chip's security architecture, which includes ARM TrustZone, antifuse-based OTP memory, and a custom Redundancy Coprocessor (RCP). Dive into the fundamental aspects of chip logic and reset processes, understanding how small oversights in basic hardware operations can compromise sophisticated security mechanisms. Gain insights into researching IP block design details for SoC attacks and the importance of thorough testing when building new features on existing IP. Follow speaker Aedan Cullen's journey through the DEF CON Hacking Challenge, examining the interconnected security mechanisms, debug features, and attack mitigations while understanding the role of meticulous system validation in hardware security.
Overview
Syllabus
38C3 - Hacking the RP2350
Taught by
media.ccc.de