TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Full key extraction of Nvidia TSEC

633 pointsby vitplisterover 3 years ago

24 comments

1_playerover 3 years ago
As a boring software engineer nowadays, these hackers &quot;for fun and profit&quot; make me proud of our profession. They&#x27;re like a Robin Hood version of Alan Turing &amp; co. working on cracking the Enigma encryption. No matter how tight the black box is, there is always a gap somewhere.<p>I&#x27;ve done some reversing when I was younger, cracked some software and hardware locks, there&#x27;s nothing as exhilarating as breaking through something that looked impossible. Well done!
评论 #29316532 未加载
评论 #29316341 未加载
sva_over 3 years ago
The concept of undervolting the chip, causing bitflips, to do a differential fault analysis[0] seems like a stroke of genius. I had no idea AES could be broken in such a fashion, of interfering with just the last 1-2 rounds of the cipher.<p>I wonder if it will be mitigated by requiring a larger minimum voltage?<p>[0] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Differential_fault_analysis" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Differential_fault_analysis</a>
评论 #29326967 未加载
评论 #29316482 未加载
评论 #29321460 未加载
评论 #29376080 未加载
评论 #29316670 未加载
评论 #29316685 未加载
Faaakover 3 years ago
Holy cow. Reading these recaps I feel a lot the Impostor Syndrome. I think I&#x27;m competent on what I do, but when I see those guys it&#x27;s hard not to feel really dumb.<p>Congrats to them !
评论 #29316464 未加载
评论 #29315914 未加载
评论 #29316898 未加载
评论 #29315913 未加载
评论 #29322662 未加载
tomc1985over 3 years ago
I&#x27;ve been out of the security game for a while, this almost reads like fiction. Good god this is nuts. I&#x27;ve heard of extracting keys with timing attacks but this is even more impressive!<p>Also, apparently the Switch perma-pwn got pwned? Sad face...<p>Also also, I hope other popular cryptoprocessors aren&#x27;t so vulnerable?
评论 #29316660 未加载
评论 #29315710 未加载
louthyover 3 years ago
Heh, I had a little laugh to myself reading this bit:<p>&gt; (2) its own &quot;secure boot&quot;<p>As soon as you see the quotes, you know what&#x27;s coming! It&#x27;s like Chekhov&#x27;s gun :)
marcodiegoover 3 years ago
Some features in NVIDIA chipsets, like changing the operating frequency, needs (hardware checked, I think) signed binary blobs. This prevents the open source nouveau driver from achieving good performance. Does this hack helps in this front?
评论 #29317624 未加载
motohagiographyover 3 years ago
Hat is off to the author for executing like that. I feel like I missed out by never playing games, as cracking them seems like the real game behind the game.<p>From a design perspective, this is why you don&#x27;t have your entire ecosystem depend on a shared secret stored in secure hardware, even if they&#x27;re written when the chip is still in the flasher at the fab. You need either to diversify your keys in the flasher, or do an initialization&#x2F;personalization protocol to update the keys to new unique per-console ones so that a crack like this isn&#x27;t portable across every other customer device. As a design consideration, it means the customer has to be online to personalize the device to get their unique keys, but that&#x27;s the trade off.<p>The beauty of demonstrating this attack is that if you think game consoles with security modules are vulnerable to having ecosystem compromising shared secrets extracted, wait until you see phones.
评论 #29321979 未加载
JohnCurranover 3 years ago
&gt; If you can get 1-2 bitflips in the last two rounds, you can solve for the key.<p>What about the bit flips allows the key to be solved for? That is the part of this I don&#x27;t understand
评论 #29327164 未加载
yborgover 3 years ago
It seems from accomplishments like this from amateurs that state level actors will have compromised any current &quot;secure&quot; or &quot;trusted&quot; computing platform.
评论 #29322054 未加载
londons_exploreover 3 years ago
These appear to be sha256 hashes of the keys, not the keys themselves...?
评论 #29316170 未加载
encryptluks2over 3 years ago
This seems to indicate that this involves the Nintendo Switch, but that it only involves older models where the first layer of security was broken and now a second. Wouldn&#x27;t the new models have patched the first layer of security by now where this wouldn&#x27;t result in anything of value?
评论 #29316177 未加载
xaduhaover 3 years ago
Why aren&#x27;t more devices use smartcards for signing&#x2F;crypto? They are omnipresent, satellite TV receivers had them, phones have them, banking cards ARE them. And yet gaming console manufacturers would rather invent their own measures to combat pwnage&#x2F;piracy.
评论 #29316321 未加载
评论 #29320355 未加载
评论 #29318710 未加载
评论 #29320500 未加载
a-dubover 3 years ago
so how does this voltage glitching stuff work exactly? are caps to ground&#x2F;buffers removed&#x2F;defeated? is it timing dependent? (sounds like they&#x27;re sending i2c messages to the power circuitry here?) do people do things like setup precise triggers or hook up function generators to kick the supply voltage around and just wait to get lucky?
评论 #29315673 未加载
评论 #29316021 未加载
评论 #29315800 未加载
评论 #29316720 未加载
评论 #29316108 未加载
评论 #29315778 未加载
toxikover 3 years ago
Are these numbers “illegal” to share like the BluRay key?
评论 #29315983 未加载
评论 #29315622 未加载
评论 #29315618 未加载
评论 #29316102 未加载
hkoppover 3 years ago
The magic to me is that the CPU glitches are caused completely on the software side. With dedicated hardware such as flying probe testers this attack is state-of-the-art afaik. But glitching the CPU only with software, i.e., causing hardware bugs only with software is what really surprised me.
snthdover 3 years ago
Why are there valuable keys on the device? I (wrongly) assumed the device would only contain public keys to verify signed code.
评论 #29317248 未加载
评论 #29329977 未加载
ChuckMcMover 3 years ago
Wow, this was the first I had read about m2m i2c injection hacks to mess with the PMIC. That is a clever trick!
1MachineElfover 3 years ago
What is a TSEC?<p>EDIT:<p><pre><code> Well, some clever guy ;-) reminded them that the T210 chip (the main CPU) has a proprietary NVIDIA &quot;security processor&quot; called TSEC, which has: [2] (1) its own SRAM (protected from the rest of the system) (2) its own &quot;secure boot&quot; (protected from the rest of the system) (3) bus mastering capabilities (4) and.. is able to DMA to ARM7&#x27;s memory</code></pre>
评论 #29319654 未加载
pabs3over 3 years ago
Seems the other TSEC exploits mentioned might refer to these:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;CAmadeus&#x2F;falcon-tools" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;CAmadeus&#x2F;falcon-tools</a> <a href="https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-34393" rel="nofollow">https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-3439...</a>
oh_sighover 3 years ago
Does this txt seem to end early for anyone else? How does one go from the bit-flipped output to the key?
评论 #29322086 未加载
Jugurthaover 3 years ago
I love everything about this. It has brought joy to my day.
hsbauauvhabzbover 3 years ago
What is the implications of breaching these keys?
jesuspieceover 3 years ago
Hardware attacks never cease to amaze me. nice work, thanks for sharing
sydthrowawayover 3 years ago
Seriously, security is an utterly pointless field