Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday July 17 2020, @01:27PM   Printer-friendly
from the debugging-for-fun-and-profit dept.

Submitted via IRC for boru.

https://www.infoq.com/news/2020/07/nRF52-debug-resurrect/:

A recent hardware attack on the Nordic nRF52 chip uses local access to gain chip-level debugging capabilities that persist in silicon, unpatchable in software. Nordic has confirmed the issue and encouraged device manufacturers to detect openings of the enclosure, as the chip is not hardened against fault injection.

This chip is used in so many bluetooth products. Might be fun to go wardriving and find some and see if any have accessible SWD pins.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by sjames on Friday July 17 2020, @08:00PM

    by sjames (2882) on Friday July 17 2020, @08:00PM (#1023047) Journal

    A sufficiently determined attacker will always be able to read out data from hardware. It's just a matter of how determined the attacker is.

    The best you can do is to make the device tamper evident and make it take long enough that you can notice that the device is missing and take appropriate security measures.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2