Skip to content

Commit

Permalink
Update blog post
Browse files Browse the repository at this point in the history
  • Loading branch information
redfast00 committed Jan 24, 2025
1 parent 49e7156 commit 90b90fc
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion content/blog/22-23/reverse_engineering_epaper.md
Original file line number Diff line number Diff line change
Expand Up @@ -136,8 +136,10 @@ At the time of writing this blog post, 30.19% of the 32K flash memory of the e-i

Thanks [pcy](https://icosahedron.website/@pcy) for answering my many questions and concerns about voltage glitching attacks.

**2025-01-24 update**: it turned out that one of the pages of the dump got corrupted (all 0xff bytes); I have since switched to working on another unrelated project (esp32-open-mac) and have not worked further on reproducing the attack again to get an uncorrupted page and be able to reverse engineer the firmware. For other people trying this attack: it would be good to create a custom PCB that has all the nescessary components needed to execute the glitching attack instead of modifying a regular PCB. This would make it a lot easier to swap in different microcontrollers in case one of the pages is corrupted.

If you have questions, comments or some things are not clear, feel free to email me <a class="email" href="mailto:%7a%65%75%73%62%6c%6f%67%40%64%65%76%72%65%6b%65%72%2e%62&#101;">zeusblog@<span>not</span>devreker.be</a>


[^1]: The Hardware Hacker, by Andrew 'bunnie' Huang
[^2]: [Bozzato, C., Focardi, R., & Palmarini, F. (2019). Shaping the Glitch: Optimizing Voltage Fault Injection Attacks](https://doi.org/10.13154/tches.v2019.i2.199-224)
[^2]: [Bozzato, C., Focardi, R., & Palmarini, F. (2019). Shaping the Glitch: Optimizing Voltage Fault Injection Attacks](https://doi.org/10.13154/tches.v2019.i2.199-224)

0 comments on commit 90b90fc

Please sign in to comment.