Tom’s Hardware | Check out this article from Tom’s Hardware highlighting IOActive’s recent win for ‘Extracting antifuse secrets from RP2350 by FIB/PVC’ during the RP2350 Hacking Challenge hosted by Raspberry Pi.
“Data bits stored in the RP2350’s OPT memories, based on antifuses, were extracted using a well-known semiconductor failure analysis technique leveraging passive voltage contrast (PVC) with a focused ion beam (FIB).
IOActive’s five-strong team reckons their unique attack vector is potent enough to apply to other systems using antifuse memory for confidentiality. Organizations using antifuse memory this way should therefore “immediately reassess their security posture,” says IOActive, and at least use chaffing techniques to make it harder for attackers to recover any data.”