"Our aim was to smoke out weaknesses early, so that we could fix them before RP2350 became widely deployed in secure applications." - Eben Upton.
All of the hacks required some form of physical access to the chip to retrieve the data. Some tinkered with the power to induce faults...another ground away part of the chip package and fired a laser at the internals."
Raspberry Pi also commissioned cybersecurity outfit Hextree to evaluate the chip's secure boot process...the team was able to inject faults that weren't spotted by the glitch detectors.
While having your hardware hacked is less than ideal, the computer maker was very impressed by the attacks and opted to award $20,000 to each of the winners.
Collection
[
|
...
]