Side Channel Attacks: Bypassing JTAG Censorship

Поделиться
HTML-код
  • Опубликовано: 4 ноя 2024

Комментарии • 8

  • @GNXClone
    @GNXClone 6 месяцев назад

    Ah this takes me back over 20 years. Hacking into access cards by glitching voltage and/or clock signal. Never used EMI though.

  • @richardstockwell4862
    @richardstockwell4862 Год назад +1

    Awesome stuff man wish there were more content like this.

  • @fenugrec5697
    @fenugrec5697 Год назад

    Interesting... any luck with undervolting and/or overclocking ? What cpu is that, MPC5556 ?

    • @blockharbor
      @blockharbor  Год назад +1

      Its MPC5566, we did have success over JTAG password checks using voltage dropping glitches.

  • @eurowerx4267
    @eurowerx4267 Год назад

    Looks like a lot of work and some pricey equipment. Magic Motorsports $5500 master software package

  • @jimmy-servanjimmy-servan
    @jimmy-servanjimmy-servan 9 месяцев назад

    hello how can i contact you ? thx

    • @blockharbor
      @blockharbor  9 месяцев назад

      You can reach us here on our website: blockharbor.io/contact-us