Line 19:
Line 19:
Additionally, the attacker can also read the rest of the OTP region and obtain the contents of the two blocks locked out by boot1 (which are currently unused).
Additionally, the attacker can also read the rest of the OTP region and obtain the contents of the two blocks locked out by boot1 (which are currently unused).
−
NOTE: A successful attack was implemented and demonstrated, to some extent, by derrek at the 34C3 convention.
+
NOTE: A successful attack was implemented and demonstrated, to some extent, by derrek at the 33C3 convention.
| boot1 AES key extraction
| boot1 AES key extraction
| None
| None