element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Industrial Automation
  • Technologies
  • More
Industrial Automation
Blog Robot Can Now Extract RAM Content
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Industrial Automation to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: Catwell
  • Date Created: 23 Jun 2023 6:26 PM Date Created
  • Views 835 views
  • Likes 5 likes
  • Comments 1 comment
  • esp32
  • security
  • robotics
  • robot
  • cabeatwell
  • data
Related
Recommended

Robot Can Now Extract RAM Content

Catwell
Catwell
23 Jun 2023

image

The team’s robot can pull memory and read its contents. (Image credit: Ang Cui, Red Balloon Security)

We’re familiar with collecting chip data via freezing methods, but now this can be automated with robots. During the Recon reverse engineering conference, Ang Cui, Red Balloon Security founder, demonstrated a cyro-mechanical robot’s ability to extract encrypted data from DDR3 memory modules. These days, it’s difficult to reverse engineer devices because hardware manufacturers disabled JTAG debugging interfaces and UART circuitry.

Their low-cost, extremely precise robot works by freezing one RAM chip at a time rather than relying on fault injection or reverse engineering through laser ablation. They then remove the memory to read the RAM contents by placing it inside the field-programmable gate array (FPGA). In this case, they can look at the code, data, stack, heap, and all the physical memory.  

Earlier this year, Cui and his team also used this technique for the Siemens vulnerability disclosure work. After removing and reading a memory chip, they had to pull off five chips since they’re interlaced. Three chips were on one side, while two were on the bottom of the board. This required the team to remove all five simultaneously, which is very complex.

Instead, they removed them one at a time, looking for the device’s deterministic execution and electromagnetic emanation. Doing so allowed them to determine where the device goes through CPU-bound operations. This approach made it possible to pull each memory chip out in tens of milliseconds. From there, they reconstructed the memory for the data, code, and bootloader. That’s sufficient time for a CNC machine to remove memory chips.

The robot, which has a CNC without the motors and X-axis actuator, attaches to a memory reader built with the FPGA and an ESP32 module-based controller running MicroPython. It simplifies the cold boot attack and features a conductive elastomer IC test socket, allowing it to perform the attack. Thanks to the socket’s flexibility, the robot can use inexpensive hardware to press the memory chips into place without causing damage.

With the FPGA-based memory reading system, a custom bootload isn’t essential to acquire code execution for dumping DRAM contents. The attack is also simplified due to the robot’s ability to move DRAM chips between the device and the readout system. The team showcased the robot on a SIMATIC S7-1500 PLC and extracted the encrypted firmware binaries. They say this approach can be used on DDR4 and DDR5 if the robot has a more costly FPGA-based memory readout system.

Have a story tip? Message me at: http://twitter.com/Cabe_Atwell

  • Sign in to reply
Parents
  • robogary
    robogary over 2 years ago

    scary

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
Comment
  • robogary
    robogary over 2 years ago

    scary

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
Children
No Data
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube