STM32F103 flash ROM read-out service

Damien Goutte-Gattat dgouttegattat at incenp.org
Thu Jun 7 00:08:09 CEST 2018


On 06/06/2018 08:50 PM, Philipp Klaus Krause wrote:
> See https://www.aisec.fraunhofer.de/en/FirmwareProtection.html for 
> some research on breaking STM32 readout protection published in 
> January.

For what it's worth, STMicroelectronics claims that the attack described
in this paper "affects only the STM32F0 and is not successful in all
other series" [1].

Whether you believe them or not is up to you. Of note, the authors of
that paper themselves do not claim the attack works on anything else
than the STM32F0.

(But of course, just because *this* attack (presumably) does not work on
the STM32F103, it does not mean that nobody can ever come up with a
successful attack on that chip...)


Damien


[1]
https://community.st.com/thread/46432-hacking-readout-protection-on-stm32#comment-181542

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180606/baca6130/attachment-0001.sig>


More information about the Gnupg-users mailing list