The list below is compiled to inform, guide, and inspire budding security researchers. Oh and to pick something for bedtime reading too.
- https://raelize.com/blog/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/
- https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/
- https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/
- https://limitedresults.com/2019/08/pwn-the-esp32-crypto-core/
- Compromising device security via NVM controller vulnerability
- https://www.cl.cam.ac.uk/~sps32/HWIO_OTB.pdf
- https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/
- https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass-part-2/
- https://limitedresults.com/2020/01/nuvoton-m2351-mkrom-armv8-m-trustzone/
- https://media.ccc.de/v/36c3-10859-trustzone-m_eh_breaking_armv8-m_s_security
- Fill your Boots: Enhanced Embedded BootloaderExploits via Fault Injection and Binary Analysis
- https://i.blackhat.com/eu-19/Thursday/eu-19-Temeiza-Breaking-Bootloaders-On-The-Cheap-2.pdf
- https://toothless.co/blog/bootloader-bypass-part1/
- Fill your Boots: Enhanced Embedded BootloaderExploits via Fault Injection and Binary Analysis
- Shaping the Glitch: Optimizing Voltage Fault Injection Attacks