Get the latest tech news

Aedan Cullen Cracks the Raspberry Pi RP2350's Security Subsystem Wide Open


Voltage-glitch attack, demonstrated at the 38C3 event, seems to be in with a shot at winning Raspberry Pi's $20,000 CTF contest.

It also includes a security subsystem that the company hopes will make it a tempting part for use in commercial designs where higher levels of protection is required — and to highlight the feature Raspberry Pi made it the subject of a $10,000 capture the flag competition, later raised to $20,000. In a presentation at the 38th Chaos Communications Congress, Cullen demonstrates what he claims to be an attack that unveils the protected secret at the heart of Raspberry Pi's capture the flag contest — which, if validated, will earn him the prize money. Cullen's presentation is available to stream and download on the CCC website and is embedded in full above; supporting source code and high-resolution annotated die shots of the RP2350 have been published to GitHub under the reciprocal GNU General Public License 3 and Creative Commons Attribution 4.0 respectively.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of RaspBerry

RaspBerry

Photo of rp2350

rp2350

Photo of pi rp2350

pi rp2350

Related news:

News photo

The sweet Raspberry taste of success masks a missed opportunity

News photo

The worsening Raspberry Pi RP2350 E9 erratum situation

News photo

Raspberry Pi Showcases Rust On The RP2350 Microcontroller