
FLASH SALE: Ends May 22!
Udemy online courses up to 85% off.
Get Deal
Explore fault-injection techniques and their applications in exploiting embedded systems through this 44-minute Security BSides London conference talk. Learn about local attack methods used to bypass security measures like read protection, secure boot, and debug protection in embedded systems, even when the underlying code is bug-free. Discover attacker motivations, affordable tools starting under £20, and practical techniques for "glitching." Examine the fault-injection mitigations implemented in the Raspberry Pi Pico 2, including details about a $20,000 bug bounty for breaking its One-Time-Programmable flash memory protections. Gain insights into side-channel analysis techniques for recovering cryptographic keys through power fluctuation measurements and electromagnetic emanation detection. Cover essential topics including voltage fault injection, electromagnetic fault injection, clock fault injection, risk assessment, threat modeling, and mitigation strategies across automotive, industrial control systems, and IoT applications.