Summary

  • Reverse engineering has gained significant popularity, particularly among those looking to exploit vulnerabilities in chip security for personal gain.
  • One of the easiest ways to do this is known as “chip glitching,” which can allow an attacker to bypass a chip’s security and access areas that were previously locked.
  • A great example of this has just been showcased by hacker and YouTuber [Hash], who used a technique known as chip glitching on a Microchip SAM4C32C microcontroller to bypass its security.
  • After soldering the chip to a target board and connecting it to a Chip Whisperer, he located an unusual pattern that formed the basis for an AI-assisted search for vulnerabilities.
  • This allowed him to identify a target time for a power glitch, which he used to force the chip to bypass its security and drop into its boot loader.

By Dan Maloney

Original Article