<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>LimitedResults - Security Research</title>
    <link>https://www.limitedresults.com</link>
    <description>Security research, IoT exploitation, and embedded systems hacking. Only the results matter.</description>
    <language>en-us</language>
    <lastBuildDate>Tue, 22 Jun 2021 00:00:00 GMT</lastBuildDate>
    <atom:link href="https://www.limitedresults.com/api/rss" rel="self" type="application/rss+xml" />
    <image>
      <url>https://www.limitedresults.com/images/logo.png</url>
      <title>LimitedResults</title>
      <link>https://www.limitedresults.com</link>
    </image>

    <item>
      <title><![CDATA[Enter the EFM32 Gecko]]></title>
      <link>https://www.limitedresults.com/results/enter-the-efm32-gecko</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/enter-the-efm32-gecko</guid>
      <description><![CDATA[This new post presents a hardware exploit to unlock the debug port on the EFM32 Gecko MCUs Series 1 designed by Silicon Labs....]]></description>
      <pubDate>Tue, 22 Jun 2021 00:00:00 GMT</pubDate>
      <category>EFM32</category>
      <category>Fault injection</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[The PocketGlitcher]]></title>
      <link>https://www.limitedresults.com/results/the-pocketglitcher</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/the-pocketglitcher</guid>
      <description><![CDATA[This blogpost presents a modding system, called **PocketGlicher**.   It provides an automated way to perform voltage glitching, without any expensive electronic...]]></description>
      <pubDate>Sun, 14 Mar 2021 00:00:00 GMT</pubDate>
      <category>Fault injection</category>
      <category>nRF52</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[nRF52 Debug Resurrection (APPROTECT Bypass) Part 2]]></title>
      <link>https://www.limitedresults.com/results/nrf52-debug-resurrection-approtect-bypass-part-2</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/nrf52-debug-resurrection-approtect-bypass-part-2</guid>
      <description><![CDATA[After **[the Part 1 describing the APPROTECT Bypass](https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/)**, this new post presents ho...]]></description>
      <pubDate>Sun, 14 Jun 2020 00:00:00 GMT</pubDate>
      <category>nRF52</category>
      <category>Hardware Hacking</category>
      <category>Exploit</category>
      
    </item>

    <item>
      <title><![CDATA[nRF52 Debug Resurrection (APPROTECT Bypass) Part 1]]></title>
      <link>https://www.limitedresults.com/results/nrf52-debug-resurrection-approtect-bypass</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/nrf52-debug-resurrection-approtect-bypass</guid>
      <description><![CDATA[**Yes, resurrection of JTAG/SWD interface on protected platforms has always been a sensitive topic in embedded security**....]]></description>
      <pubDate>Wed, 10 Jun 2020 00:00:00 GMT</pubDate>
      <category>nRF52</category>
      <category>Hardware Hacking</category>
      <category>Exploit</category>
      
    </item>

    <item>
      <title><![CDATA[Nuvoton M2351 MKROM]]></title>
      <link>https://www.limitedresults.com/results/nuvoton-m2351-mkrom-armv8-m-trustzone</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/nuvoton-m2351-mkrom-armv8-m-trustzone</guid>
      <description><![CDATA[**TrustZone is the last hardware security mechanism integrated to ARMv8-M. This article presents some Fault Injection results achieved on Nuvoton M2351 (Cortex-...]]></description>
      <pubDate>Sun, 12 Jan 2020 00:00:00 GMT</pubDate>
      <category>Fault injection</category>
      <category>ARM</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction</guid>
      <description><![CDATA[I wanted to close my investigation by targeting the two major security features:...]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 GMT</pubDate>
      <category>ESP32</category>
      <category>Fault injection</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the ESP32 Secure Boot]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-esp32-secure-boot</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-esp32-secure-boot</guid>
      <description><![CDATA[In this post, **I focus on the ESP32 Secure Boot** and I disclose a full exploit to bypass it during the boot-up, using low-cost fault injection technique....]]></description>
      <pubDate>Sun, 01 Sep 2019 00:00:00 GMT</pubDate>
      <category>ESP32</category>
      <category>Fault injection</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the ESP32 crypto-core]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-esp32-crypto-core</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-esp32-crypto-core</guid>
      <description><![CDATA[A crypto-core (also called crypto-accelerator) is a dedicated piece of hardware inside the System-on-Chip. Its main role is to 'accelerate' cryptographic primit...]]></description>
      <pubDate>Sun, 11 Aug 2019 00:00:00 GMT</pubDate>
      <category>ESP32</category>
      <category>Fault injection</category>
      <category>Crypto</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn MBedTLS on ESP32: DFA Warm-up]]></title>
      <link>https://www.limitedresults.com/results/pwn-mbedtls-on-esp32-dfa-warm-up</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-mbedtls-on-esp32-dfa-warm-up</guid>
      <description><![CDATA[## Introduction...]]></description>
      <pubDate>Mon, 13 May 2019 00:00:00 GMT</pubDate>
      <category>ESP32</category>
      <category>Fault injection</category>
      <category>Crypto</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the WIZ connected]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-wiz-connected</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-wiz-connected</guid>
      <description><![CDATA[Once again, let's spend some money on Amazon....]]></description>
      <pubDate>Wed, 06 Feb 2019 00:00:00 GMT</pubDate>
      <category>IoT</category>
      <category>lightbulbs</category>
      <category>ESP8266</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the LIFX Mini white]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-lifx-mini-white</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-lifx-mini-white</guid>
      <description><![CDATA[### The Device...]]></description>
      <pubDate>Wed, 23 Jan 2019 00:00:00 GMT</pubDate>
      <category>IoT</category>
      <category>lightbulbs</category>
      <category>Hardware</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the Tuya lightbulbs]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-tuya-lightbulbs</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-tuya-lightbulbs</guid>
      <description><![CDATA[These lightbulbs use the Tuya Cloud. So, once connected, they become a part of the **[Tuya ecosystem](https://auth.tuya.com)**....]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 GMT</pubDate>
      <category>IoT</category>
      <category>lightbulbs</category>
      <category>ESP8266</category>
      
    </item>

    <item>
      <title><![CDATA[Pwn the Xiaomi Yeelight]]></title>
      <link>https://www.limitedresults.com/results/pwn-the-yeelight-dirty</link>
      <guid isPermaLink="true">https://www.limitedresults.com/results/pwn-the-yeelight-dirty</guid>
      <description><![CDATA[## The Yeelight...]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 GMT</pubDate>
      <category>IoT</category>
      <category>Hardware</category>
      <category>JTAG</category>
      
    </item>
  </channel>
</rss>