As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial CW305-4 Voltage Glitching with Crowbars

10 bytes added, 15:01, 1 May 2018
no edit summary
Our final goal with the CW305 Artix target is to experiment with voltage glitching. This is the CW305 equivalent of the VCC glitch attack done in [[Tutorial A3 VCC Glitch Attacks]].
== Background Information ==
The ChipWhisperer capture hardware comes with a glitch output, which is connected to a power MOSFET in the following configuration:
* If we ground the FPGA's power pins, then the power supply will effectively be driving the shunt resistor. With a supply voltage of 1.0 V and a 0.5 ohm shunt, this is a 2 A current; with a 0.1 ohm shunt, this is 10 A. It's probably a good idea to use an external power supply for this type of glitch.
== Setup ===== Hardware Setup ===
To set up the hardware for voltage glitching, only one extra connection is required compared to the setup for power analysis. Connect an SMA cable between the ChipWhisperer's glitch output and the CW305 connector labeled X3:
Note that the original SMA cable (connected to the ChipWhisperer's Measure input) is not required for voltage glitching - if you only have one cable, you can just move it over. However, it is helpful to have power traces to see what effects the voltage glitches are having on the power rails, so connect both if you can.
=== Software Setup ===
As in the previous tutorial, we can use the CW305 example script to get us started. Follow the instructions from [[Tutorial CW305-1 Building a Project]] to connect to the target and load the bitstream onto the FPGA.
From here, you can use the Glitch Explorer to sweep the glitch settings and search for a successful glitch, as we did in [[Tutorial CW305-3 Clock Glitching]]. Good luck!
== Hints ==
We had a lot of trouble creating a successful voltage glitch. If you're stuck, this section has a few ideas that you can try.

Navigation menu