... | ... | @@ -271,7 +271,7 @@ eve@attacker> ./u2m_f2m 0x0fffe000 page3.dat |
|
|
eve@attacker> ./u2m_f2m 0x0ffff000 page4.dat
|
|
|
```
|
|
|
|
|
|
Before reading the content of the attacked memory pages on the ZedBoard, set the switches in a configuration other than 0x00 and use the centre press button to send the HSM debug output (source number 1) to the LEDs such that the registered and sticky interrupts of the HSM are routed to the two rightmost LEDs.
|
|
|
Before reading the content of the attacked memory pages on the ZedBoard, set the switches in a configuration other than 0x00 and use the north press button to send the HSM debug output (source number 1) to the LEDs such that the registered and sticky interrupts of the HSM are routed to the two rightmost LEDs.
|
|
|
|
|
|
From the ZedBoard play the 2 pages which integrity is not protected and show that the modification is undetected.
|
|
|
|
... | ... | |