Get the latest tech news

SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets


bstract The widespread use of embedded systems has increased the risk of physical memory disclosure attacks. A notable example is the cold boot attack, where attackers exploit DRAM’s temperature-dependent data retention property.

That is, Volt Boot artificially creates SRAM data retention across a power cycle using a voltage probe in a PCB’s test pad or bare passive component’s lead that is connected to a target memory domain. An SoC’s domain-separated power management architecture allows us to supply voltage to a target memory through exposed pins and keep part of the chip active (that is, retaining state) while the rest of the system resets. Compared to previous-generation cold-boot attacks against standalone SRAM, Volt Boot achieves error-free data exfiltration on devices spanning three distinct microarchitectures—defeating the paradigm of on-chip computation as a viable defense against secret extraction.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of chip

chip

Photo of secrets

secrets

Photo of chill

chill

Related news:

News photo

Researchers build first chip combining electronics, photonics, and quantum light | This silicon chip breakthrough brings quantum light generation closer to scale

News photo

The Secrets We Keep

News photo

YouTuber leaked iOS secrets via friend spying on dev's phone, Apple lawsuit claims