Only given it a skim read so far but this looks like a really nice write up and it's a fantastic piece of work. Laser fault injection is a very powerful attack so great to see it becoming more accessible through work like this (or terrible if you're someone relying on security of hardware that considers LFI to be a highly advanced technique that it doesn't need to defend against...).
Tangentially related but could this setup be used for laser micro drilling? I've been wondering if there are ways to do it quick and dirty by brute forcing the reality with the fact that the year is 2025.
Much more complicated than the Cullen's hack at CCC, but I think that also required a bit of luck. This was an very interesting read in terms of solid research experimentation setup. We now have two really nice attacks on the RP2350 secure boot, and only a few months after release.
The Cullen observation that the OTP power supply wasn't being glitch detected was pretty damning and a much more devastating attack in practice. If you require decapping and lasers, anything is possible.
Only given it a skim read so far but this looks like a really nice write up and it's a fantastic piece of work. Laser fault injection is a very powerful attack so great to see it becoming more accessible through work like this (or terrible if you're someone relying on security of hardware that considers LFI to be a highly advanced technique that it doesn't need to defend against...).
Tangentially related but could this setup be used for laser micro drilling? I've been wondering if there are ways to do it quick and dirty by brute forcing the reality with the fact that the year is 2025.
Much more complicated than the Cullen's hack at CCC, but I think that also required a bit of luck. This was an very interesting read in terms of solid research experimentation setup. We now have two really nice attacks on the RP2350 secure boot, and only a few months after release.
The Cullen observation that the OTP power supply wasn't being glitch detected was pretty damning and a much more devastating attack in practice. If you require decapping and lasers, anything is possible.
Thanks for the write-up!
Now this is serious hardware hacking. Kudos for the fantastic writeup and thank you for sharing the work, it really is impressive.