The presentation discusses the vulnerability found in ARM Cortex M SOC and how it can be exploited to implant malware into the peripheral. The focus is on the security measures built within and around the chip, and how they can be bypassed.
- ARM Cortex M SOC vulnerability and how it can be exploited to change the SOC unique ID and write firmware or turn the device into a trojan or bot
- Breaking the security measures built within the SOC and bypassing the unique ID verification in secure boot
- Breaking the security measures built around the SOC and writing into the firmware
- Recommendations for chip users to prevent such vulnerabilities
The presentation provides examples of attacks, such as modifying the Remora of a promoter cell to talk linear by cellular user, and discusses the implementation of secure boot in various systems. It also highlights the importance of unique ID feature and customized bootloader to protect against readout and erasure of flash memory.