TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Bypassing Readout Protection in Nordic Semiconductor Microcontrollers

57 点作者 serhack_将近 2 年前

6 条评论

kurtoid将近 2 年前
Link should be <a href="https:&#x2F;&#x2F;www.emproof.com&#x2F;bypassing-readout-protection-in-nordic-semiconductor-microcontrollers&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.emproof.com&#x2F;bypassing-readout-protection-in-nord...</a><p>(2021)
评论 #36666803 未加载
nick0garvey将近 2 年前
Most of the attacks I see on Nordic devices are power based attacks, where cutting the power for a brief instant causes protection instructions not to run.<p>This one is entirely different, and attacks the initialization code directly. This code has no restrictions on its ability to access memory, allowing a full dump.<p>Great method.
评论 #36673227 未加载
jamesmunns将近 2 年前
Aw, it&#x27;s a shame this is an older post, I was wondering if there was a published attack for the relatively newer nRF52. The nRF52 is already a little long in the tooth (there&#x27;s an nRF53 available, and nRF54 now&#x2F;soon), but the nRF52 is still what I see most in the field today.
评论 #36671987 未加载
dmitrygr将近 2 年前
So..they read my article from 2017 [1] where i described precisely this, and then did it... cool i guess<p>[1] <a href="http:&#x2F;&#x2F;dmitry.gr&#x2F;?r=05.Projects&amp;proj=23.%20PSoC4" rel="nofollow noreferrer">http:&#x2F;&#x2F;dmitry.gr&#x2F;?r=05.Projects&amp;proj=23.%20PSoC4</a>
评论 #36673882 未加载
Zamiel_Snawley将近 2 年前
&gt; specialized solutions are needed that provide protection even after the code was extracted.<p>Anybody know what solutions they are hinting at here? Obfuscating binaries? Some kind of encrypted flash with on-the-fly decryption(but the decryption key would be protected by the same inadequate ROP)?<p>Neither of these seem effective nor practical.
评论 #36673685 未加载
jacquesm将近 2 年前
It&#x27;d be very nice if someone managed to do this for Freescale. Their stuff is all over the place and more often than not such copyprotection is used to create a commercial moat to block interop with 3rd party hardware.