Nano Enigma Uncovering the Secrets in eFuse Memories
Michal Grygarek, Martin Petr
DEF CON 32 Main Stage · Day 1 · Main Stage
In the realm of embedded system security, hardware-based protections are often considered the strongest line of defense. Among these, **eFuse memories** play a critical role, serving as one-time programmable (OTP) storage for immutable configurations such as secure boot keys, debugging interface disablements, and device unique identifiers. However, a talk presented at DEF CON 32 by Martin Petr and Michal Grygarek, titled "Nano Enigma: Uncovering the Secrets in eFuse Memories," challenged a fundamental assumption underlying the confidentiality of data stored in these eFuses.
AI review
This session delivers a brutal, much-needed reality check on the perceived security of eFuse memories. Petr and Grygarek meticulously dismantle the myth that physical attacks on deeply embedded eFuses are beyond the reach of all but state-level adversaries, demonstrating accessible, low-cost decapsulation and delayering techniques. Their work exposes a widespread vulnerability across embedded systems that mistakenly rely on eFuses for confidentiality, forcing a critical re-evaluation of hardware security models and the storage of sensitive data like encryption keys.