Jasper van Woudenberg
jzvw.bsky.social
Jasper van Woudenberg
@jzvw.bsky.social
Reposted by Jasper van Woudenberg
Efabless is shut until further notice! Read this post to find out how past, current and future shuttles will be affected.

www.linkedin.com/posts/tinyta...
Tiny Tapeout on LinkedIn: We’re very sad to hear that Efabless Corporation has shut down until…
We’re very sad to hear that Efabless Corporation has shut down until further notice: https://lnkd.in/dvxjQvnn For anyone who doesn’t know, Efabless has…
www.linkedin.com
March 1, 2025 at 4:31 PM
Glad to see we’re able to reach a larger audience! The Chinese version of our book is doing well. @oflynn.com /ht Haisu Lee (our translator)
February 25, 2025 at 3:51 PM
Reposted by Jasper van Woudenberg
Great presentation, glitching the RPi 2350 on an unprotected path (USB VDD, they glitch protect others) to disturb reading critical OTP permission bits to mistakenly enable unsecured RISC-V cores to mess with TrustZone secured ARM cores without any limitations.
streaming.media.ccc.de/38c3/relive/...
Relive: Hacking the RP2350 – 38C3: Illegal Instructions Streaming
Live streaming from the 38th Chaos Communication Congress
streaming.media.ccc.de
December 29, 2024 at 4:53 AM
Reposted by Jasper van Woudenberg
events.ccc.de/congress/202...

You can bypass security on the RP2350 by glitching the OTP power supply (which does not have a glitch detector on it). This causes OTP to supply "guard data" instead of real data, and interpreting the guard data happens to enable RISC-V mode, which can do anything.
38c3: Hacking the RP2350
The RP2350 security architecture involves several interconnected mechanisms which together provide authentication of code running on the chip, protected one-time-programmable storage, fine-grained con...
events.ccc.de
December 28, 2024 at 11:35 AM
Yet another DMA form factor… Proper use of the IOMMU remains the primary mitigation.
Positive Technologies has developed a new attack that exploits the SD Express standard to gain access to a device's memory through its SD card reader

The DaMAgeCard attack exploits the fact that the new SD Express standard can operate in both SDIO and NVMe

swarm.ptsecurity.com/new-dog-old-...
December 9, 2024 at 4:11 PM
Reposted by Jasper van Woudenberg
Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9
December 6, 2024 at 4:48 PM