I'd been pushing hard trying to get a demo of how you can break an AES-256 bootloader. This type of bootloader is often used in products for protecting firmware updates and a good demonstration of why you should care about side channel attacks as an embedded engineer.
It's not pretty but it does work, so I wanted to put some documentation and details up here.
more here..........http://hackaday.io/project/956/log/10108-aes256-is-not-enough-breaking-a-bootloader
It's not pretty but it does work, so I wanted to put some documentation and details up here.
more here..........http://hackaday.io/project/956/log/10108-aes256-is-not-enough-breaking-a-bootloader