STM32 Development Boards Portfolio
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller. -
STM32-P103 User's Manual
STM-P103 development board User's manual Document revision C, August 2016 Copyright(c) 2014, OLIMEX Ltd, All rights reserved INTRODUCTION STM32-P103 board is development board which allows you to explore thee features of the ARM Cortex M3 STM32F103RBT6 microcontroller produced by ST Microelectronics Inc. The board has SD/MMC card connector and allows USB Mass storage device demo to be evaluated. The RS232 driver and connector allows USB to Virtual COM port demo to be evaluated. The CAN port and driver allows CAN applications to be developed. The UEXT connector allows access to all other UEXT modules produced by OLIMEX (like MOD-MP3, MOD-NRF24LR, MOD-NOKIA6610, etc) to be connected easily. In the prototype area the customer can solder his own custom circuits and interface them to USB, CAN, RS232 etc. STM32-P103 is almost identical in hardware design to STM32-P405. The major difference is the microcontroller used (STM32F103 vs STM32F405). Another board with STM32F103 and a display is STM32-103STK. A smaller (and cheaper board) with STM32F103 is the STM32-H103. Both boards mentioned also have a version with the newer microcontroller STM32F405 used. The names are respectively STM32-405STK and STM32-H405. BOARD FEATURES STM32-P103 board features: - CPU: STM32F103RBT6 ARM 32 bit CORTEX M3™ - JTAG connector with ARM 2×10 pin layout for programming/debugging with ARM-JTAG, ARM-USB- OCD, ARM-USB-TINY - USB connector - CAN driver and connector - RS232 driver and connector - UEXT connector which allow different modules to be connected (as MOD-MP3, -
Schedule 14A Employee Slides Supertex Sunnyvale
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 SCHEDULE 14A Proxy Statement Pursuant to Section 14(a) of the Securities Exchange Act of 1934 Filed by the Registrant Filed by a Party other than the Registrant Check the appropriate box: Preliminary Proxy Statement Confidential, for Use of the Commission Only (as permitted by Rule 14a-6(e)(2)) Definitive Proxy Statement Definitive Additional Materials Soliciting Material Pursuant to §240.14a-12 Supertex, Inc. (Name of Registrant as Specified In Its Charter) Microchip Technology Incorporated (Name of Person(s) Filing Proxy Statement, if other than the Registrant) Payment of Filing Fee (Check the appropriate box): No fee required. Fee computed on table below per Exchange Act Rules 14a-6(i)(1) and 0-11. (1) Title of each class of securities to which transaction applies: (2) Aggregate number of securities to which transaction applies: (3) Per unit price or other underlying value of transaction computed pursuant to Exchange Act Rule 0-11 (set forth the amount on which the filing fee is calculated and state how it was determined): (4) Proposed maximum aggregate value of transaction: (5) Total fee paid: Fee paid previously with preliminary materials. Check box if any part of the fee is offset as provided by Exchange Act Rule 0-11(a)(2) and identify the filing for which the offsetting fee was paid previously. Identify the previous filing by registration statement number, or the Form or Schedule and the date of its filing. (1) Amount Previously Paid: (2) Form, Schedule or Registration Statement No.: (3) Filing Party: (4) Date Filed: Filed by Microchip Technology Incorporated Pursuant to Rule 14a-12 of the Securities Exchange Act of 1934 Subject Company: Supertex, Inc. -
Reconfigurable Embedded Control Systems: Problems and Solutions
RECONFIGURABLE EMBEDDED CONTROL SYSTEMS: PROBLEMS AND SOLUTIONS By Dr.rer.nat.Habil. Mohamed Khalgui ⃝c Copyright by Dr.rer.nat.Habil. Mohamed Khalgui, 2012 v Martin Luther University, Germany Research Manuscript for Habilitation Diploma in Computer Science 1. Reviewer: Prof.Dr. Hans-Michael Hanisch, Martin Luther University, Germany, 2. Reviewer: Prof.Dr. Georg Frey, Saarland University, Germany, 3. Reviewer: Prof.Dr. Wolf Zimmermann, Martin Luther University, Germany, Day of the defense: Monday January 23rd 2012, Table of Contents Table of Contents vi English Abstract x German Abstract xi English Keywords xii German Keywords xiii Acknowledgements xiv Dedicate xv 1 General Introduction 1 2 Embedded Architectures: Overview on Hardware and Operating Systems 3 2.1 Embedded Hardware Components . 3 2.1.1 Microcontrollers . 3 2.1.2 Digital Signal Processors (DSP): . 4 2.1.3 System on Chip (SoC): . 5 2.1.4 Programmable Logic Controllers (PLC): . 6 2.2 Real-Time Embedded Operating Systems (RTOS) . 8 2.2.1 QNX . 9 2.2.2 RTLinux . 9 2.2.3 VxWorks . 9 2.2.4 Windows CE . 10 2.3 Known Embedded Software Solutions . 11 2.3.1 Simple Control Loop . 12 2.3.2 Interrupt Controlled System . 12 2.3.3 Cooperative Multitasking . 12 2.3.4 Preemptive Multitasking or Multi-Threading . 12 2.3.5 Microkernels . 13 2.3.6 Monolithic Kernels . 13 2.3.7 Additional Software Components: . 13 2.4 Conclusion . 14 3 Embedded Systems: Overview on Software Components 15 3.1 Basic Concepts of Components . 15 3.2 Architecture Description Languages . 17 3.2.1 Acme Language . -
Insider's Guide STM32
The Insider’s Guide To The STM32 ARM®Based Microcontroller An Engineer’s Introduction To The STM32 Series www.hitex.com Published by Hitex (UK) Ltd. ISBN: 0-9549988 8 First Published February 2008 Hitex (UK) Ltd. Sir William Lyons Road University Of Warwick Science Park Coventry, CV4 7EZ United Kingdom Credits Author: Trevor Martin Illustrator: Sarah Latchford Editors: Michael Beach, Alison Wenlock Cover: Wolfgang Fuller Acknowledgements The author would like to thank M a t t Saunders and David Lamb of ST Microelectronics for their assistance in preparing this book. © Hitex (UK) Ltd., 21/04/2008 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical or photocopying, recording or otherwise without the prior written permission of the Publisher. Contents Contents 1. Introduction 4 1.1 So What Is Cortex?..................................................................................... 4 1.2 A Look At The STM32 ................................................................................ 5 1.2.1 Sophistication ............................................................................................. 5 1.2.2 Safety ......................................................................................................... 6 1.2.3 Security ....................................................................................................... 6 1.2.4 Software Development .............................................................................. -
FEZ Cerbuino Bee - GHI Electronics
FEZ Cerbuino Bee - GHI Electronics FEZ Cerbuino Bee 2 Description FEZ Cerbuino is for developers wanting a low-cost Arduino-comaptible Gadgeteer-compatible mainboard. This 100% open-source (OSHW) offer includes an on-board power connector, voltage regulators, MicroSD connector, USB host and USB Client connectors. Ready to plug-and-play using the included USB cable. The power of .NET Gadgeteer platform sockets is found on FEZ Cerbuino. These 3 gadgeteer-compatible sockets allow developers to seamlessly connect almost any of the Gadgeteer modules. The Xbee socket automatically brings all sorts of wireless options to the table, including WiFi and Zigbee. Key Features: 3 .NET Gadgeteer compatible sockets that include these types: Y, A, I, K, O, P, S, U. Arduino Compatible headers (some signals are shared with Gadgeteer sockets) Xbee Adapter for ZigBee or WiFi XBee modules. Configurable on-board LED. Software/Hardware features includes but not limited to: .NET Micro Framework 4.2 (supporting C# and Visual Basic) with FEZ Cerberus firmware 168Mhz 32bit processor with floating point 1MB FLASH, over 300K for user's code FEZ Cerbuino Bee - GHI Electronics 192KB RAM, 112KB for user's heap Full TCP/IP Stack with HTTP, TCP, UDP, DHCP Ethernet support with Ethernet ENC28 module. USB host USB Device SPI I2C 2 UART CAN 9 Analog Inputs. 2 Analog Output 4-bit microSD interface 6 PWM OneWire interface Built-in Real Time Clock (Needs 32Khz crystal) RLPLite allowing users to load native code (C/Assembly) for real-time requirements. FAT File System Dimensions: W 8cm x L 5.5cm Power Through USB port or an external DC 6-9V power supply (connecting both is safe). -
Arduino Sensor Beginners Guide
Arduino Sensor Beginners Guide So you want to learn arduino. Good for you. Arduino is an easy to use, cheap, versatile and powerful tool that can be used to make some very effective sensors. This guide is meant to give you the basics of getting started with Arduino, and provide you with some basic code that will work with many sensors. The Materials To begin, you will need 1. An ARDUINO: I personally use an ARDUINO UNO V2, but there are many different types available. For our purposes they should all work the same so if you already have one, great. 2. A breadboard: Breadboards are named after cutting boards that early circuit enthusiasts used to hold their sensors. A breadboard is used as a place to hold your sensors, resistors and wires, and also serves as an easy way to connect things together. Breadboards come in all shapes and sizes. I would recommend something like this. This will cost you about 5 dollars online. 3. Wire: Wires are essential to Arduino. They are what allow you to actually connect your Arduino to stuff. Most small, hobby wire will work. All you need to make sure is that it is small enough to easily fit into the pins on your Arduino and breadboard. 4. A Sensor: Sensors come in all shapes and sizes. Most of the guides I have written use sensors similar to these, but don’t feel restricted to these ones. Many of them work pretty much the same way. Using Your Breadboard Different breadboards are set up in different ways. -
Μc/OS-II™ Real-Time Operating System
μC/OS-II™ Real-Time Operating System DESCRIPTION APPLICATIONS μC/OS-II is a portable, ROMable, scalable, preemptive, real-time ■ Avionics deterministic multitasking kernel for microprocessors, ■ Medical equipment/devices microcontrollers and DSPs. Offering unprecedented ease-of-use, ■ Data communications equipment μC/OS-II is delivered with complete 100% ANSI C source code and in-depth documentation. μC/OS-II runs on the largest number of ■ White goods (appliances) processor architectures, with ports available for download from the ■ Mobile Phones, PDAs, MIDs Micrium Web site. ■ Industrial controls μC/OS-II manages up to 250 application tasks. μC/OS-II includes: ■ Consumer electronics semaphores; event flags; mutual-exclusion semaphores that eliminate ■ Automotive unbounded priority inversions; message mailboxes and queues; task, time and timer management; and fixed sized memory block ■ A wide-range of embedded applications management. FEATURES μC/OS-II’s footprint can be scaled (between 5 Kbytes to 24 Kbytes) to only contain the features required for a specific application. The ■ Unprecedented ease-of-use combined with an extremely short execution time for most services provided by μC/OS-II is both learning curve enables rapid time-to-market advantage. constant and deterministic; execution times do not depend on the number of tasks running in the application. ■ Runs on the largest number of processor architectures with ports easily downloaded. A validation suite provides all documentation necessary to support the use of μC/OS-II in safety-critical systems. Specifically, μC/OS-II is ■ Scalability – Between 5 Kbytes to 24 Kbytes currently implemented in a wide array of high level of safety-critical ■ Max interrupt disable time: 200 clock cycles (typical devices, including: configuration, ARM9, no wait states). -
Arduino Part 1
Topics: Microcontrollers Programming Basics: structure and variables Arduino Digital Output Analog to Digital Conversion + Architecture Von- Neumann Classification en fonction de l’organisation de la mémoire : Architecture Harvard Classification des CISC microprocesseurs Classification en fonction de type RISC d’instruction : VLIW + Architectures : Von Neumann versus Harvard 3 + Harvard architecture address data memory data PC CPU address program memory data 4 +Harvard Architecture Example Block Diagram of the PIC16C8X The Von Neumann Architecture Von Neumann Architecture Designing Computers • All computers more or less based on the same basic design, the Von Neumann Architecture! • Model for designing and building computers, based on the following three characteristics: 1) The computer consists of four main sub-systems: The Von • Memory • ALU (Arithmetic/Logic Neumann Unit) Architecture • Control Unit • Input/Output System (I/O) 2) Program is stored in memory during execution. 3) Program instructions are executed sequentially. The Von Neumann Architecture Bus Processor (CPU) Memory Input-Output Control Unit ALU Communicate Store data and program with "outside world", Execute program e.g. Do arithmetic/logic operations • Screen requested by program • Keyboard • Storage devices • ... • Memory, also called RAM (Random Access Memory), – Consists of many memory cells (storage units) of a fixed size. Each cell has an address associated with it: 0, 1, … – All accesses to memory are to a Memory specified address. A cell is the minimum unit of access (fetch/store a complete cell). Subsystem – The time it takes to fetch/store a cell is the same for all cells. • When the computer is running, both – Program – Data (variables) are stored in the memory. -
Microcontrollers for IOT Prototyping – Part 2 V
Microcontrollers for IOT Prototyping – Part 2 V. Oree, EEE Dept, UoM 1 Introduction • The Internet of Things is considered by many to be the 4th Industrial Revolution. • But unlike the first three, it is not a new technology. It is a new way of integrating existing technologies. As a result, it will not require a new kind of engineer. • Instead, to implement IoT, anyone hoping to embed IoT‐enabled capabilities in applications should gain a general understanding of the technologies. • Our intent is not to describe every conceivable aspect of the IoT or its enabling technologies but, rather, to provide an easy reference in your exploration of IoT solutions and plan potential implementations. 2 Introduction INTERNET OF THINGS 3 Sensor Selection Choosing a sensor (for example, a temperature sensor) for an IOT application may seem like a straightforward decision. However, selecting the right sensor involves taking many factors into account: Cost Supplier: How trustworthy is this seller? (Look at reviews from other buyers) Accuracy & Precision Availability: Some components can only be in large quantities. Measurement Range: What ranges will it work for? Power Consumption: Will it work with the power source I have? Sensor Selection Example: Temperature Sensor Texas Instruments LMT84LP Atmel AT30TSE754A‐S8M‐T Sparkfun DS18B20 Texas Instruments LM35DZ Cost: $0.91 Cost: $0.53 Cost: $9.95 Cost: $1.86 Accuracy: +/‐ 0.4°C Accuracy: +/‐ 2°C Accuracy: +/‐ 0.5°C Accuracy: +/‐ 1.5°C Range: ‐50°C to 150°C Range: ‐55°C to 125°C Range: ‐55°C to 125°C Range: 0°C to 100°C Voltage: 1.5V – 5.5V Voltage: 1.7V –5.5V Voltage: 3.0V –5.5V Voltage: 4V – 30V Availability: >10 Availability: >4000 Availability: >5 Availability: >10 5 IoT Development boards • IoT development boards enable makers to prototype their ideas. -
Retrofitting Leakage Resilient Authenticated Encryption To
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Florian Unterstein1∗, Marc Schink1∗, Thomas Schamberger2∗, Lars Tebelmann2∗, Manuel Ilg1 and Johann Heyszl1 1 Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany [email protected], [email protected] 2 Technical University of Munich, Germany, Department of Electrical and Computer Engineering, Chair of Security in Information Technology {t.schamberger,lars.tebelmann}@tum.de Abstract. The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be considered. This makes the protection of required cryptographic keys and implementations challenging, especially for commercial off-the-shelf (COTS) microcontrollers that typically have no hardware countermeasures. In this work, we demonstrate how unprotected hardware AES engines of COTS microcontrollers can be efficiently protected against side-channel attacks by constructing a leakage resilient pseudo random function (LR-PRF). Using this side-channel protected building block, we implement a leakage resilient authenticated encryption with associated data (AEAD) scheme that enables secured firmware updates. We use concepts from leakage resilience to retrofit side-channel protection on unprotected hardware AES engines by means of software-only modifications. The LR-PRF construction leverages frequent key changes and low data complexity together with key dependent noise from parallel hardware to protect against side-channel attacks. Contrary to most other protection mechanisms such as time-based hiding, no additional true randomness is required. Our concept relies on parallel S-boxes in the AES hardware implementation, a feature that is fortunately present in many microcontrollers as a measure to increase performance. -
Micro Manufacturing Beverage System
2019 Group 11 Eric Velez Lance Adler Ryan Burns Parke Novak Micro Manufacturing Beverage System Senior Design 2 Documentation 1 Table of Contents 1.0 Executive Summary................................................................................................................ 1 2.0 Project Description ................................................................................................................. 2 2.1 Motivation and Goals .......................................................................................................... 2 2.2 Objectives ............................................................................................................................ 2 2.4 Hardware Diagram .............................................................................................................. 3 2.5 Software Diagram ................................................................................................................ 4 3.0 Research and Background Information ............................................................................... 5 3.1 Similar Projects and Products ........................................................................................... 5 3.1.1 Drink Wizard .................................................................................................................. 5 3.1.2 Under the Sun Drink Mixer .......................................................................................... 6 3.1.3 Smartender ...................................................................................................................