Day[0] cover image

[binary] An OpenBSD overflow and TPM bugs

Day[0]

00:00

The JTAG Debugging Attacks - What You Need to Know

A group of hackers tried to get a disabled JTAG fuse to be misinterpreted. They could then enable the J TAG, which would allow them to not really care about the flash encryption because they could just dump the plain text firmware. Success rates were fairly low; we're talking about like 15 to 20 test cases over 250,000 runs. But especially when you're talking about things like keys and dumping the firmware, you really only need to do it once.

Play episode from 35:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app