Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security through Transparency - Tales from the RP2350 Hacking Challenge

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced microcontroller security vulnerabilities through a detailed conference presentation examining fault injection and secure boot bypass techniques on the RP2350 microcontroller. Learn how researchers from the University of Birmingham, independent security experts, Hextree, and IOActive successfully demonstrated five distinct attack vectors that compromise the secure boot guarantees of a locked-down RP2350 chip despite its dedicated hardware countermeasures. Discover the implementation of voltage, electromagnetic, and laser fault injection techniques used to re-enable disabled CPU cores and debugging ports, boot unverified firmware images, bypass signature verification checks, and gain unprivileged access to sensitive data. Examine the direct extraction of antifuse memory contents using focused ion beam passive voltage contrast methods. Understand the critical importance of microcontroller unit security in modern computing landscapes where these devices serve as root-of-trust components in larger systems and safety-critical applications. Gain insights into proposed mitigations against these attack vectors and valuable lessons learned for improving the overall MCU security landscape through transparency and responsible disclosure practices.

Syllabus

WOOT '25 - Security through Transparency: Tales from the RP2350 Hacking Challenge

Taught by

USENIX

Reviews

Start your review of Security through Transparency - Tales from the RP2350 Hacking Challenge

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.