Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a groundbreaking security research presentation that demonstrates how to extract sensitive data from CMOS one-time-programmable (OTP) memories using focused ion beam (FIB) passive voltage contrast techniques. Learn about the vulnerabilities in antifuse-based memory systems that device manufacturers have long claimed to be "high security" storage solutions for critical data like encryption keys, serial numbers, and factory trimming parameters. Discover the step-by-step methodology for attacking 40nm CMOS gate dielectric breakdown antifuses, including sample preparation techniques and FIB analysis procedures that can recover stored bits through passive voltage contrast imaging. Understand how this attack can extract the bitwise OR of physically adjacent memory rows and explore potential mechanisms for separately reading even and odd rows. Examine a practical demonstration on a commodity microcontroller where researchers successfully extracted firmware encryption keys and other sensitive data within realistic timeframes of one day for sample preparation plus several hours of FIB analysis time. Gain insights into the implications of these findings for semiconductor security, the limitations of antifuse-based protection schemes, and the broader impact on integrated circuit security assumptions in the industry.