Enter the EFM32 Gecko
This new post presents a hardware exploit to unlock the debug port on the EFM32 Gecko MCUs Series 1 designed by Silicon Labs....
Security research, exploit development, and technical writeups
This new post presents a hardware exploit to unlock the debug port on the EFM32 Gecko MCUs Series 1 designed by Silicon Labs....
This blogpost presents a modding system, called **PocketGlicher**. It provides an automated way to perform voltage glitching, without any expensive electronic...
After **[the Part 1 describing the APPROTECT Bypass](https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/)**, this new post presents ho...
**Yes, resurrection of JTAG/SWD interface on protected platforms has always been a sensitive topic in embedded security**....
**TrustZone is the last hardware security mechanism integrated to ARMv8-M. This article presents some Fault Injection results achieved on Nuvoton M2351 (Cortex-...
I wanted to close my investigation by targeting the two major security features:...
In this post, **I focus on the ESP32 Secure Boot** and I disclose a full exploit to bypass it during the boot-up, using low-cost fault injection technique....
A crypto-core (also called crypto-accelerator) is a dedicated piece of hardware inside the System-on-Chip. Its main role is to 'accelerate' cryptographic primit...
## Introduction...
Once again, let's spend some money on Amazon....
### The Device...
These lightbulbs use the Tuya Cloud. So, once connected, they become a part of the **[Tuya ecosystem](https://auth.tuya.com)**....
## The Yeelight...