As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial B3-2 Timing Analysis with Power for Attacking TSB

489 bytes added, 22:22, 17 September 2017
no edit summary
{{Warningbox|This tutorial has not yet been updated for ChipWhisperer 4.0.0 release. If you are using 3.x.x see the "V3" link in the sidebar.}}
{{Infobox tutorial
|name = B2: Viewing Instruction Power Differences
|image =
|caption =
|software versions =
|capture hardware = CW-Lite, CW-Lite 2-Part, CW-Pro
|Target Device =
|Target Architecture = XMEGA
|Hardware Crypto = No
|Purchase Hardware =
This tutorial will introduce you to breaking devices by determining when a device is performing certain operations. It will break simple bootloaders which may otherwise seem 'secure' against password attacks. In particular this uses the excellent [ TinySafeBoot] bootloader for AVR microcontrollers. The example uses an old release of TinySafeBoot, since newer releases do not have this vulnerability!
Approved_users, bureaucrat, administrator

Navigation menu