Attacking the Nintendo 3DS Boot ROMs

02/01/2018
by   Michael Scires, et al.
0

We demonstrate attacks on the boot ROMs of the Nintendo 3DS in order to exfiltrate secret information from normally protected areas of memory and gain persistent early code execution on devices which have not previously been compromised. The attack utilizes flaws in the RSA signature verification implementation of one of the boot ROMs in order to overflow ASN.1 length fields and cause invalid firmware images to appear valid to the signature parser. This is then used to load a custom firmware image which overwrites the data-abort vector with a custom data abort handler, then induces a data-abort exception in order to reliably redirect boot ROM code flow at boot time. This executes a payload which, due to its reliable early execution by a privileged processor, is able to function as a persistent exploit of the system in order to exfiltrate secret information (such as encryption keys) from normally protected areas of memory.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/31/2018

Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in ...
research
01/05/2022

Secure Remote Attestation with Strong Key Insulation Guarantees

Recent years have witnessed a trend of secure processor design in both a...
research
07/13/2020

The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform

The growing sophistication of cyber attacks, vulnerabilities in high com...
research
12/08/2018

Cryptanalysis of a One-Time Code-Based Digital Signature Scheme

In this paper, we consider a one-time digital signature scheme recently ...
research
03/05/2021

Transfer Learning-Based Model Protection With Secret Key

We propose a novel method for protecting trained models with a secret ke...
research
08/13/2021

The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs

Voltage fault injection (FI) is a well-known attack technique that can b...
research
09/03/2018

Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

In order to counter forgeries of tickets for public transport or mass ev...

Please sign up or login with your details

Forgot password? Click here to reset