Members: Yonatan Brunschwig
Supervisor: Dr. Shimon Mizrahi
This project focuses on the exploration of voltage fault injection techniques on AirTags, highlighting a critical vulnerability at the intersection of hardware and software security. By administering precise voltage variations to the System on Chip (SoC), the project successfully bypasses built-in security mechanisms to extract the firmware. This breakthrough allows for a reverse engineering analysis, providing insights into the firmware's architecture and potential weak points. The investigation involves modifying the firmware by altering specific data such as the serial number. The modified firmware is then reflashed onto the device, demonstrating the feasibility of this attack vector. This method showcases how physical access can lead to substantial security breaches, emphasizing the need for enhanced protective measures in hardware design to combat such threats.