Google, IBM & Microsoft Certificates — All in One Plan
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 21-minute conference talk from USENIX WOOT '24 demonstrating the first successful fault injection attack that bypasses security features on the Espressif ESP32 V3 microcontroller. Learn how researchers from the Technology Innovation Institute and Raelize managed to circumvent both Secure Boot and Flash Encryption protections using a single electromagnetic glitch. Discover the technical details of how they manipulated encrypted flash contents to modify a CRC value on the bootloader signature, enabling arbitrary code execution through Download Mode in ROM. Understand the implications of these hardware-level vulnerabilities that led to Security Advisory AR2023-005 and CVE-2023-35818, requiring a new hardware revision for remediation.
Syllabus
WOOT '24 - Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using...
Taught by
USENIX