Talks
Events

Breaking Bootloaders on the Cheap

David Oswald, Qais Temeiza at Black Hat Europe 2019

For this presentation, we reverse-engineered and analysed the bootloaders of three widely used microcontrollers (NXP LPC1343, ST STM32F4, and ST STM8) in order to assess if the readout protection can be overcome with software-based attacks.

Our analysis shows that the bootloader of the LPC1343 (and other chips from the same family) contains a critical vulnerability in the "Write to RAM" command.

Full Abstract & Presentation Materials: https://www.blackhat.com/eu-19/briefings/schedule/#breaking-bootloaders-on-the-cheap-17518