As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Difference between revisions of "Tutorial A3 VCC Glitch Attacks"

From ChipWhisperer Wiki
Jump to: navigation, search
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Warningbox|For the older V3.x tools, see [[V3:Tutorial A3 VCC Glitch Attacks]]}}
+
{{Warningbox|This tutorial has been updated for ChipWhisperer 5 release. If you are using 4.x.x or 3.x.x see the "V4" or "V3" link in the sidebar.}}
  
This advanced tutorial will demonstrate power glitch attacks using the ChipWhisperer system.
+
{{Infobox tutorial
 +
|name                  = A3: VCC Glitch Attacks
 +
|image                  =
 +
|caption                =
 +
|software versions      =
 +
|capture hardware      = CW-Lite, CW-Lite 2-Part, CW-Pro
 +
|Target Device          =
 +
|Target Architecture    = Arm
 +
|Hardware Crypto        = No
 +
|Purchase Hardware      =
 +
}}
  
== Background on VCC (Power) Glitching ==
+
<!-- To edit this, edit Template:Tutorial_boilerplate -->
 +
{{Tutorial boilerplate}}
  
The previous clock glitching tutorials looked into the assumption of a constant clock. But instead we can modify the voltage of the device, causing for example a failure to correctly read a memory location or otherwise cause havoc with the proper functioning.
+
* Jupyter file: '''Fault_2-Introduction_to_Vcc_Glitch_Attacks.ipynb'''
  
[[File:vccglitch_working.png|frame|none|alt=|caption Top trace is the VCC (power) measured at the microcontroller pin, lower trace is the clock to the device.]]
 
  
[[File:vccglitch_working_zoom.png|frame|none|alt=|caption A zoom in of the previous figure, showing the offset between the clock and the glitches.]]
+
== XMEGA Target ==
  
[[File:vccglitch_notworking_zoom.png|frame|none|alt=|caption Changing the offset means the glitches are ineffective - this requries considerable experimentation to discover the value for offset, glitch width, and number of glitches.]]
+
This tutorial is not available for XMEGA targets.
  
=== Background on Glitch Generation ===
+
== ChipWhisperer-Lite ARM / STM32F3 Target ==
  
For more details, please see [[Tutorial_A2_Introduction_to_Glitch_Attacks_(including_Glitch_Explorer)]], this tutorials assumes you have already performed the clock glitching tutorial. This tutorial will use the ''Glitch Explorer'', which is described in the previous tutorial.
+
See the following for using:
 +
* ChipWhisperer-Lite 32-bit (STM32F3 Target)
 +
* ChipWhisperer-Lite Capture + STM32F3 Target on UFO Board (including NAE-SCAPACK-L1/L2 users)
 +
* ChipWhisperer-Pro + STM32F3 Target on UFO Board
  
The glitch generation hardware is the same as used in the clock glitching attack. The generated glitches are synchronous to the device clock, and inserted at a precise offset from the clock edge.
+
https://chipwhisperer.readthedocs.io/en/latest/tutorials/fault_2-openadc-cwlitearm.html#tutorial-fault-2-openadc-cwlitearm
  
Glitches can be inserted continuously or triggered by some event. The following figure shows the generation of two glitches:
+
== ChipWhisperer Nano Target ==
  
[[File:glitchgen-mux-glitchonly.png|frame|none]]
+
This tutorial is not available for the ChipWhisperer Nano.
 
+
The VCC glitching method here uses an electronic switch (a MOSFET) to short the power line to GND at specific instances. The following figure shows the basic function of this system:
+
 
+
[[File:glitch-vccglitcher.png|frame|none]]
+
 
+
This method allows use with the standard side-channel analysis development board, which has resistors inserted into the VCC lines already. The downside of this method is that it can only generate short glitches, since the power consumption through the shunt resistor will short out the resistor.
+
 
+
The MOSFET glitching hardware is built into the ChipWhisperer-Lite (both CW1173 and CW1180) board. The ChipWhisperer-Capture Rev2 uses an external VCC glitching board.
+
 
+
== Hardware Setup ==
+
 
+
=== ChipWhisperer-Lite (CW1173) with built-in XMEGA Target ===
+
 
+
The XMEGA target will work out-of-the-box for this tutorial. As usual, no hardware setup is required - everything on the CW-Lite board is ready to go.
+
 
+
=== ChipWhisperer-Lite (CW1173/CW1180) with external AVR (NOTDUino/Multi-Target) ===
+
 
+
The AVR is an extremely reliable target to glitch. To do this, you need to connect the following cables:
+
 
+
# SMA Cable from the ''Glitch'' port to the VCC shunt.
+
# 20-Pin Target Cable for Clock &amp; Data.
+
# Optional: SMA Cable from the ''Measure'' port to the VCC shunt (can be used to monitor glitch insertion).
+
 
+
The following shows an example of connecting the NOTDuino target to the ChipWhisperer-Lite:
+
 
+
<blockquote>[[File:notduino_cwlite.jpg|image]]
+
</blockquote>
+
If using a target with only a single SMA, only connect the ''Glitch'' port. The measure port is optional to allow you to monitor the VCC line as you are inserting the glitch.
+
 
+
== Setting up Glitch Example ==
+
 
+
=== Firmware Setup ===
+
 
+
Just as in the clock glitching example, you will be required to program the AVR microcontroller with an example you can glitch. Once again program in the glitch example code to use the <code>glitch1()</code> function, as described in [[Tutorial_A2_Introduction_to_Glitch_Attacks_(including_Glitch_Explorer)]].
+
 
+
If using the AVR target, be sure to modify the <code>makefile</code> to select the new target type (i.e. if you previously targeted the XMEGA, that hex-file will not work on the NOTDuino).
+
 
+
Programming the device is also described in Step #4 in the following section.
+
 
+
=== Software Setup ===
+
 
+
<ol>
+
<li>
+
  <p>Select the <code>connect_simpleserial.py</code> script</p>
+
  <p>[[File:connect_script.png|500px]]</p>
+
</li>
+
<li>
+
  <p>Run the <code>connect_simpleserial.py</code> script, by pressing the <b>Run</b> button</p>
+
  <p>[[File:connect_script_preview.png|500px]]</p>
+
</li>
+
<li>
+
  <p>Setup up the settings by running the appropriate setup script for your device</p>
+
  <p>[[File:setup_script_xmega.png|500px]]</p>
+
</li>
+
<li>
+
  <p>Run the setup script by pressing the run button, if you want to see what parameters the script changes, inspect the preview</p>
+
  <p>[[File:setup_preview_xmega.png|500px]]</p>
+
</li>
+
<li>
+
  <p>Open the appropriate programmer from top main menu ''Tools'', and in the dialog press ''Check Signature'' to verify you can connect to the target</p>
+
  <p>[[File:xmega_programmer.png|325px]]</p>
+
</li>
+
<li>
+
  <p>Find the correct firmware file, previously compiled for the target you are using, and press the ''Erase/Program/Verify FLASH''</p>
+
  <p>[[File:xmega_programmer_press_program.png|325px]]</p>
+
</li>
+
<li>
+
  <p>Time to setup the voltage glitching parameters. Start with the ''Glitch Module'' section under the ''Scope Settings'' tab</p>
+
  <ol>
+
  <li>
+
    <p>Set the ''Clock Source'' as ''CLKGEN'':</p>
+
  </li>
+
  <li>
+
    <p>Setup the Glitch Module to NOT output anything by default '''VERY IMPORTANT TO AVOID DAMAGE'''</p>
+
    <p>Set the ''Output Mode'' as ''Glitch Only'', this is the step that insures '''you do not cause constant glitches''':</p>
+
  </li>
+
  <li>
+
    <p>Set the ''Glitch Trigger'' to ''Ext Trigger:Single-Shot''</p>
+
  </li>
+
  </ol>
+
  <p>[[File:glitch_setup.png|500px]]</p>
+
</li>
+
<li>
+
  <p>Now activate the lower power glitch module, by enabling the ''HS-Glitch Out Enable (Low Power)'' toggle under ''Trigger Pins'' section in the ''Scope Settings'' tab</p>
+
  <p>For the ChipWhisperer-Lite (CW1173/CW1180), set ''Target HS IO-Out'' option to ''CLKGEN''.</p>
+
  <p>[[File:low_power_glitch_enable.png|500px]]</p>
+
</li>
+
<li>
+
  <p> Navigate to the ''Target Settings'' tab and remove all the text in the ''Load Key Command'', ''Go Command'', and ''Output Format'' fields</p>
+
  <p> Set the ''Output Format'' field to ''$GLITCH$''</p>
+
  <p>[[File:target_output_setting.png|500px]]</p>
+
</li>
+
<li>
+
  <p> Run the aux reset script for the appropriate target. The avr, stm32f and xmega targets use the <code>aux_reset_cw1173.py</code>. '''This scripts needs to be modified for the specific target'''. Uncomment the line for your target and comment out the lines for the other targets. The timing of the reset can also be changed, the comments explain the pros and cons of each. The reset after arm usually works better and needs less setup, but this depends on the target.</p>
+
  <syntaxhighlight lang=python>
+
"""Set up resets via CW1173
+
Contains a few adjustable lines to switch between XMEGA/AVR/STM32F and change reset
+
timing (relative to scope arm)
+
"""
+
 
+
from chipwhisperer.capture.auxiliary.ResetCW1173Read import ResetCW1173
+
 
+
# GUI compatibility
+
try:
+
    aux_list = self.aux_list
+
except NameError:
+
    pass
+
 
+
# Delay between arming and resetting, in ms
+
delay_ms = 1000
+
 
+
# Reset XMEGA device
+
Resetter = ResetCW1173(pin='pdic', delay_ms=delay_ms)
+
# Reset STM32Fx device
+
#Resetter = ResetCW1173(pin='nrst', delay_ms=delay_ms)
+
# Reset AVR
+
#Resetter = ResetCW1173(pin='nrst', delay_ms=delay_ms)
+
 
+
# Reset before arming
+
# avoids possibility of false triggers
+
# need delay in target firmware to avoid race condition
+
#aux_list.register(Resetter.resetThenDelay, "before_trace")
+
 
+
# Reset after arming
+
# scope can catch entire reset
+
# avoids race condition
+
# target reset can cause false triggers (usually not an issue)
+
aux_list.register(Resetter.delayThenReset, "after_arm")
+
 
+
  </syntaxhighlight>
+
</li>
+
<li>
+
  <p>You can see what aux modules are active in the ''Aux Settings'' tab. Here you can see the preview, enable/disable, and remove each module</p>
+
  <p>[[File:aux_setting.png|500px]]</p>
+
</li>
+
</ol>
+
 
+
=== Monitoring Glitch Insertion ===
+
 
+
We can optionally enable the power analysis capture, and monitor how the power consumption changes as we insert a glitch. To do this:
+
 
+
<ol style="list-style-type: decimal;">
+
<li>Switch to the ''Scope Settings'' tab.</li>
+
<li>Switch the ''ADC Clock Source'' as being ''CLKGEN x4''.</li>
+
<li>Press ''Reset ADC DCM'', confirm the frequency is 29.5 MHz as expected.</li>
+
<li>Switch the ''Trigger Setup'' --&gt; ''Mode'' to be ''Rising Edge''</li>
+
<li>Switch the ''Trigger Setup'' --&gt; ''Total Samples'' to be ''1000''</li>
+
<li>Switch the ''Gain Setting'' --&gt; ''Setting'' to be ''40''. You might need to adjust this for different hardware.</li>
+
<li>
+
  <p>Press ''Capture 1'', confirm some waveform is displayed. For example with the NOTDuino Target on the ChipWhisperer-Lite, the waveform looks like this:</p>
+
  <p>[[File:waveform-notduino-normal.png|image]]</p>
+
</li>
+
<li>If this does't work: check the trigger in use is the ''Target IO4'' pin.</li>
+
<li>
+
  <p>Play around a bit with the glitch width, offset, and repeat. You should see different effects in the power consumption traces. For example the following shows a narrow (15% pulse width) glitch being inserted:</p>
+
  <p>[[File:waveform-notduino-glitch1.png|image]]</p>
+
</li>
+
</ol>
+
 
+
=== Starting the Glitch Attack ===
+
 
+
We'll now look at glitching this routine. As before after sending the <code>A</code> the system goes into an infinite loop, and sends <code>1234</code> after exiting from the loop. Using VCC glitching we'll escape from this loop!
+
 
+
Rather than using the manual trigger, we'll jump right into using the Glitch Explorer to break this target. First, we'll setup some basic glitch parameters for your specific target.
+
 
+
<ol>
+
<li>Switch to the ''Target Settings'' tab, and set the ''Output Format'' to <code>$GLITCH$</code>.</li>
+
<li>
+
  <p>Open the ''Glitch Explorer'', and hit ''Capture 1'' a few times. Confirm this populates the table with various examples.</p>
+
  <p>[[File:ge-normal.png|image]]</p>
+
</li>
+
<li>
+
  <p>We need to setup the ''Normal Response'' and ''Successful Response''. Note in this example the normal response has a little random noise we want to ignore, but we want to capture when the device resets after the glitch and sends the &quot;hello&quot; message twice. We could accomplish this with the following bit of Python code:</p>
+
  <pre>s.endswith(&quot;hello\nA&quot;) and (len(s) &lt; 12)</pre>
+
  <p>This looks for both the ending without glitch, and the length of the string isn't too long. In the case of the successful glitch, we just want to see if &quot;1234&quot; is printed. This can be accomplished in Python with:</p>
+
  <pre>&quot;1234&quot; in s</pre>
+
  <p>You can always experiment using the ''Python Console'' to see how your potential systems work. For example here is checking that the first line works:</p>
+
  <pre>&gt;&gt;&gt; s = &quot;\x1ahello\nA&quot;
+
&gt;&gt;&gt; s.endswith(&quot;hello\nA&quot;) and (len(s) &lt; 12)
+
True
+
&gt;&gt;&gt; s = &quot;\x1ahello\nAhello\nA&quot;
+
&gt;&gt;&gt; s.endswith(&quot;hello\nA&quot;) and (len(s) &lt; 12)
+
False</pre>
+
  <p>Finally, configure the Glitch Explorer:</p>
+
 
+
  <blockquote>
+
  <ol style="list-style-type: lower-alpha;">
+
    <li>Set the ''Normal Response'' to <code>s.endswith(&quot;hello\nA&quot;) and (len(s) &lt; 12)</code></li>
+
    <li>Set the ''Successful Response'' to <code>&quot;1234&quot; in s</code></li>
+
  </ol>
+
  </blockquote>
+
 
+
  <p>You can test the updated color-coding seems to be working too with a few ''Capture 1'' events.</p>
+
</li>
+
 
+
<li>
+
  <p>Using the following table, set the ''Glitch Width (as % of period)'' and ''Repeat'' on the ''Scope Settings'' tab:</p>
+
{| class="wikitable"
+
! Parameter
+
! AVR on Multi-Target or NOTDuino
+
|-
+
| Glitch Width (as % of period)
+
| 49
+
|-
+
| Repeat
+
| 10
+
|}
+
</li>
+
<li>
+
  <p>Finally, let's configure the Glitch Explorer to sweep the ''Offset'' and ''Width'' parameters by running the <code>ge_widthoffset_vary.py</code>. The starting, stopping and step attributes can be changed for both parameters by editing the script</p>
+
  <syntaxhighlight lang=python>
+
"""Glitch Explorer example to modify clock offset & width.
+
 
+
To use this be sure to set 'Output Format' as $GLITCH$ so data is passed through.
+
"""
+
 
+
class IterateGlitchWidthOffset(object):
+
    def __init__(self, ge_window):
+
        self._starting_offset = -40
+
        self._starting_width = -40
+
        self.ge_window = ge_window
+
 
+
    def reset_glitch_to_default(self, scope, target, project):
+
        """ Set glitch settings to defaults. """
+
        self.offset = self._starting_offset
+
        self.width = self._starting_width
+
 
+
    def change_glitch_parameters(self, scope, target, project):
+
        """ Example of simple glitch parameter modification function. """
+
        # This value is minimum clock offset/width increment
+
        scope.glitch.offset += 0.390624
+
 
+
        if scope.glitch.offset > 40:
+
            scope.glitch.offset = self._starting_offset
+
            scope.glitch.width += 0.390624
+
 
+
        if scope.glitch.width > 40:
+
            scope.glitch.width = self._starting_width
+
 
+
        # Write data to scope
+
        #scope.glitch.width = self.width
+
        #scope.glitch.offset = self.offset
+
 
+
        #You MUST tell the glitch explorer about the updated settings
+
        if self.ge_window:
+
            self.ge_window.add_data("Glitch Width", scope.glitch.width)
+
            self.ge_window.add_data("Glitch Offset",scope.glitch.offset)
+
 
+
glitch_iterator = IterateGlitchWidthOffset(self.glitch_explorer)
+
self.aux_list.register(glitch_iterator.change_glitch_parameters, "before_trace")
+
#self.aux_list.register(glitch_iterator.reset_glitch_to_default, "before_capture")
+
  </syntaxhighlight>
+
</li>
+
<li>
+
  <p> You can again check if the aux module was registered by going to the ''Aux Settings'' tab.</p>
+
  <p>[[File:aux_settings_with_glitch_vary.png|500px]]</p>
+
</li>
+
<li>
+
  <p>On the ''Generic Settings'' tab:</p>
+
  <blockquote>
+
  <ol style="list-style-type: lower-alpha;">
+
    <li>Ensure the ''Trace Format'' is set to ''None'' (i.e., no traces will be written to disk).</li>
+
    <li>Set the ''Number of Traces'' to 200.</li></ol>
+
  </blockquote>
+
</li>
+
<li>Press the ''Capture Multi'' button. You will get a warning as there is no trace writer, but can just hit ''Continue Anyway'', since we do not want to store traces to disk.</li>
+
<li>
+
  <p>Hopefully you will determine some useful parameters for glitching this target:</p>
+
  <blockquote>
+
  <p>[[File:ge-success.png|image]]</p>
+
  </blockquote>
+
</li>
+
<li>Try reducing the ''Repeat'' parameter in the ''Glitch Module'' settings. See how few cycles you can glitch while still achieving a reliable glitch.</li>
+
</ol>
+
 
+
Once you have the glitch parameter determined, you can work on trying to recreate some of the previous tutorials such as glitching passed the password prompt.
+
 
+
== Glitching More Advanced Targets: Raspberry Pi ==
+
 
+
It is also possible to glitch more advanced targets, such as the Raspberry Pi development board! This requires some additional hardware setup which will be discussed here.
+
 
+
The Raspberry Pi is a small ARM-based computer that runs Linux. This tutorial will show you how to influence a program running in userland via voltage glitching.
+
 
+
We will use the ChipWhisperer-Lite board, as it has integrated high-power glitching MOSFET.
+
 
+
=== Hardware Setup ===
+
 
+
<blockquote>'''warning'''
+
 
+
This tutorial can cause permanent damage to your Raspberry Pi board. The generation of glitches means driving the power supply and device beyond limits specified in the absolute maximum ratings. Only perform this tutorial if you are not too attached to your Raspberry Pi board.
+
 
+
YOU PERFORM THIS TUTORIAL AT YOUR OWN RISK. NEWAE TECHNOLOGY INC. IS NOT RESPONSIBLE FOR DAMAGE CAUSED BY FOLLOWING THIS TUTORIAL.
+
</blockquote>
+
To glitch the board, you must solder a wire onto the ''VDD_CORE'' power supply, ideally as close to the BGA power pin as possible. To do this identify the power plane by looking at the schematic:
+
 
+
<blockquote>[[File:rpi_schematic.png|image]]
+
</blockquote>
+
And then solder a wire onto the VCC side of a decoupling capacitor, such as C65. Check the polarity with a DMM to ensure you have the positive side and solder a fine wire to it.
+
 
+
<blockquote>[[File:rpi_solder1.jpg|400px|image]]
+
 
+
[[File:rpi_solder2.jpg|400px|image]]
+
</blockquote>
+
We will now mount a connector so we can connect this to the ChipWhisperer-Lite Glitch port. This will require you to check your specific revision - on this board an empty hole (test point) labeled &quot;TP2&quot; connects to ground, and made a handy location to connect the SMA connector to ground.
+
 
+
The following shows an example of soldering the SMA connector onto the board, note the GND is soldered on both top and bottom to give additional strength:
+
 
+
[[File:rpi_sma.jpg|400px|image]]
+
 
+
The positive side of the capacitor connects to the inner conductor of the SMA &quot;GLITCH&quot; port, and connect the outer connector to ground on the Raspberry Pi. At this point do not yet plug into the GLITCH port, we will do that once setup is complete.
+
 
+
Finally you need to boot the Raspberry Pi and connect to it. This is suggested to be done with a SSH shell over the Ethernet connection, as the Ethernet connection typically has very good protection against voltage transients. If you connect the Raspberry Pi to a monitor over HDMI, there is a chance the glitches may cause invalid voltage levels on the HDMI port which could damage your monitor.
+
 
+
Once you have connected to it, simply make a file called <code>glitch.c</code> with the following contents:
+
 
+
<pre>#include &lt;stdio.h&gt;
+
 
+
int main(void){
+
    int i,j,k,cnt;
+
    k = 0;
+
    while(1){
+
    cnt = 0;
+
    for(i=0; i&lt;5000; i++){
+
      for(j=0; j&lt;5000; j++){
+
          cnt++;
+
      }
+
    }
+
    printf(&quot;%d %d %d %d\n&quot;, cnt, i, j,k++);
+
    }
+
}</pre>
+
Compile to an executable with:
+
 
+
<pre>$ gcc glitch.c -o glitch</pre>
+
And run the executable:
+
 
+
<pre>$ ./glitch
+
25000000 5000 5000 0
+
25000000 5000 5000 1
+
25000000 5000 5000 2
+
25000000 5000 5000 3
+
25000000 5000 5000 4
+
25000000 5000 5000 5</pre>
+
The output is split into two parts. The first three are used to monitor the glitch insertion (this is the <code>25000000 5000 5000</code>, the second makes it easier for you to confirm if the Raspberry Pi has crashed.
+
 
+
Now that you have a working system - let's break it!
+
 
+
=== Glitch Parameters ===
+
 
+
Glitching the Raspberry Pi is very simple. We just need to generate an appropriately sized glitch, as the following shows:
+
 
+
<ol style="list-style-type: decimal;">
+
<li>Start ChipWhisperer-Capture.</li>
+
<li>Set the ''Scope Module'' to ''ChipWhisperer/OpenADC'', and the ''connection'' to ''ChipWhisperer-Lite''.</li>
+
<li>Hit the ''Scope Connect'' button. There is no target for this example.</li>
+
<li>Set the CLKGEN frequency to ''120 MHz''.</li>
+
<li>Set the Glitch module Source to ''CLKGEN''.</li>
+
<li>Set the Glitch Mode to ''Enable Only''.</li>
+
<li>Ensure the ''Glitch Trigger'' is ''Manual''.</li>
+
<li>Set the ''Repeat'' to ''38''.</li>
+
<li>Click the ''HS-Glitch Out Enable (High Power)'' check-box.</li>
+
<li>Connect the SMA cable for the glitch output to the Raspberry Pi.</li>
+
<li><p>With the output of the ''glitch'' program running, hit the ''Manual Trigger'' button. This will cause a glitch to be inserted, and observe the output of your glitch program.</p>
+
<p>Most likely the glitch width was insufficient for a glitch to be inserted, so increase the ''Repeat'' count to increase the width, and try pressing the ''Manual Trigger'' button again. In this example a glitch was successfully inserted with a width of ''52'', so you might want to try a few larger numbers. If you do things wrong your Raspberry Pi will crash and you'll need to reboot it and continue experimenting.</p>
+
<p>The following shows an example of inserting several glitches successfully:</p>
+
<p>[[File:rpi-glitch.png|image]]</p></li></ol>
+
 
+
== Links ==
+
 
+
{{Template:Tutorials}}
+
[[Category:Tutorials]]
+

Latest revision as of 05:31, 29 July 2019

This tutorial has been updated for ChipWhisperer 5 release. If you are using 4.x.x or 3.x.x see the "V4" or "V3" link in the sidebar.

A3: VCC Glitch Attacks
Target Architecture Arm
Hardware Crypto No
Software Release V3 / V4 / V5

This tutorial will introduce you to measuring the power consumption of a device under attack. It will demonstrate how you can view the difference between assembly instructions. In ChipWhisperer 5 Release, the software documentation is now held outside the wiki. See links below.

To see background on the tutorials see the Tutorial Introduction on ReadTheDocs, which explains what the links below mean. These wiki pages (that you are reading right now) only hold the hardware setup required, and you have to run the Tutorial via the Jupyter notebook itself. The links below take you to the expected Jupyter output from each tutorial, so you can compare your results to the expected/known-good results.

Running the tutorial uses the referenced Jupyter notebook file.

  • Jupyter file: Fault_2-Introduction_to_Vcc_Glitch_Attacks.ipynb


XMEGA Target

This tutorial is not available for XMEGA targets.

ChipWhisperer-Lite ARM / STM32F3 Target

See the following for using:

  • ChipWhisperer-Lite 32-bit (STM32F3 Target)
  • ChipWhisperer-Lite Capture + STM32F3 Target on UFO Board (including NAE-SCAPACK-L1/L2 users)
  • ChipWhisperer-Pro + STM32F3 Target on UFO Board

https://chipwhisperer.readthedocs.io/en/latest/tutorials/fault_2-openadc-cwlitearm.html#tutorial-fault-2-openadc-cwlitearm

ChipWhisperer Nano Target

This tutorial is not available for the ChipWhisperer Nano.