Enter the EFM32 Gecko
This new post presents a hardware exploit to unlock the debug port on the EFM32 Gecko MCUs Series 1 designed by Silicon Labs....
Security research, IoT exploitation, and embedded systems hacking.
Latest research and technical writeups
This new post presents a hardware exploit to unlock the debug port on the EFM32 Gecko MCUs Series 1 designed by Silicon Labs....
This blogpost presents a modding system, called **PocketGlicher**. It provides an automated way to perform voltage glitching, without any expensive electronic...
After **[the Part 1 describing the APPROTECT Bypass](https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/)**, this new post presents ho...
**Yes, resurrection of JTAG/SWD interface on protected platforms has always been a sensitive topic in embedded security**....
**TrustZone is the last hardware security mechanism integrated to ARMv8-M. This article presents some Fault Injection results achieved on Nuvoton M2351 (Cortex-...
I wanted to close my investigation by targeting the two major security features:...
Get notified when new security research is published
Subscribe via RSS