Reverse engineering has gained significant popularity, particularly among those looking to exploit vulnerabilities in chip security for personal gain.
One of the easiest ways to do this is known as “chip glitching,” which can allow an attacker to bypass a chip’s security and access areas that were previously locked.
A great example of this has just been showcased by hacker and YouTuber [Hash], who used a technique known as chip glitching on a Microchip SAM4C32C microcontroller to bypass its security.
After soldering the chip to a target board and connecting it to a Chip Whisperer, he located an unusual pattern that formed the basis for an AI-assisted search for vulnerabilities.
This allowed him to identify a target time for a power glitch, which he used to force the chip to bypass its security and drop into its boot loader.