|capture hardware = CW-Lite
|Target Device =
|Target Architecture = XMEGA
|Hardware Crypto = No
|Purchase Hardware =
This advanced tutorial will demonstrate clock glitch attacks using the ChipWhisperer system. This will introduce you to many required features of the ChipWhisperer system when it comes to glitching. This will be built on in later tutorials to generate voltage glitching attacks, or when you wish to attack other targets.
'''If you're working on an Arm target, it's recommended that you
instead skip to [[Tutorial A3 VCC Glitch Attacks]]'''. '''Voltage glitching is possible on Arm targets, but is far more difficult than using voltage glitching, or clock glitching on the XMEGA target.'''
== Background on Clock Glitching ==
=== Firmware Setup ===
The glitch examples requires you to program the target device. The software to program is located at <code>chipwhisperer\hardware\victims\firmware\glitch-simple</code> of your ChipWhisperer release or GIT clone. As before, create a <code>Makefile.platform</code> and add <code>PLATFORM</code> and <code>CRYPTO_TARGET</code> variables to reflect your hardware. For example:
<pre>#CWLite STM32 Target PLATFORM = CW308_STM32F3 CRYPTO_TARGET = TINYAES128C</pre>
<pre>#CW Lite AVR Target
PLATFORM = CW303</pre>
You can build the software by running the make command as follows:
You should also open the file <code>glitchsimple.c</code> which is the source code. The subroutine being glitched in this example looks like this:
Once the AVR/XMEGA is programmed (see previous tutorials), you may need to setup a few jumpers depending on your hardware.
=== Hardware Setup ===
XMEGA Target ( CW1173 + CW303) ====
The XMEGA target on the ChipWhisperer-Lite requires no configuration. If you have separated the boards, you can attach them with the 20-pin cable.
==== Multi-Target Board, AVR (CW301) ====