Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 134 tok/s
Gemini 2.5 Pro 41 tok/s Pro
GPT-5 Medium 27 tok/s Pro
GPT-5 High 27 tok/s Pro
GPT-4o 84 tok/s Pro
Kimi K2 174 tok/s Pro
GPT OSS 120B 430 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

The bumpy road towards iPhone 5c NAND mirroring (1609.04327v1)

Published 14 Sep 2016 in cs.CR

Abstract: This paper is a short summary of a real world mirroring attack on the Apple iPhone 5c passcode retry counter under iOS 9. This was achieved by desoldering the NAND Flash chip of a sample phone in order to physically access its connection to the SoC and partially reverse engineering its proprietary bus protocol. The process does not require any expensive and sophisticated equipment. All needed parts are low cost and were obtained from local electronics distributors. By using the described and successful hardware mirroring process it was possible to bypass the limit on passcode retry attempts. This is the first public demonstration of the working prototype and the real hardware mirroring process for iPhone 5c. Although the process can be improved, it is still a successful proof-of-concept project. Knowledge of the possibility of mirroring will definitely help in designing systems with better protection. Also some reliability issues related to the NAND memory allocation in iPhone 5c are revealed. Some future research directions are outlined in this paper and several possible countermeasures are suggested. We show that claims that iPhone 5c NAND mirroring was infeasible were ill-advised.

Citations (33)

Summary

  • The paper demonstrates the feasibility of bypassing the iPhone 5c passcode limits through hardware-based NAND mirroring achieved with low-cost methods.
  • The paper details precise desoldering and reverse-engineering techniques that overcome critical vulnerabilities in NAND Flash memory.
  • The paper highlights significant forensic implications and proposes future research to strengthen mobile device hardware security.

Overview of "The Bumpy Road Towards iPhone 5c NAND Mirroring"

The paper authored by Sergei Skorobogatov meticulously details the technical process and challenges faced in executing a hardware-based NAND mirroring attack on the Apple iPhone 5c. Through this research, the author demonstrates the feasibility of bypassing the iPhone's passcode retry limit without using sophisticated equipment. The paper represents both a practical and theoretical exploration into mobile device hardware security, specifically targeting NAND Flash memory in the context of iOS 9.

Technical Summary

The research explores the intricacies of the iPhone 5c's system architecture by physically accessing and partially reverse-engineering the proprietary bus protocol used by the device's system-on-chip (SoC). The experimental method involved desoldering the NAND Flash chip to gain access to its internal data and control protocols. A significant aspect of the paper discusses the challenges in handling the delicate hardware components. Desoldering techniques required precise temperature control to avoid memory corruption or physical damage to the device.

Essentially, the goal of the mirroring attack was to reset the device's passcode attempt counter by creating a clone of the NAND memory. This required the establishment of a reliable communication interface between the NAND chip and external programming equipment. The implementation involved replicating NAND commands and leveraging reprogrammable memory chips to enable continuous brute-force attacks on the device's passcodes.

Numerical Results and Claims

A noteworthy result of this endeavor was the ability to achieve a complete brute-force attack on the four-digit passcode within 40 hours, using a budget of less than $100 for components. Forensic implications arise from the fact that this process can modify the original device data, potentially altering critical information. The paper notably counters previous assertions by law enforcement agencies that NAND mirroring was unfeasible, providing empirical evidence of its practicality.

Implications and Future Work

From a practical standpoint, this research has significant implications for forensic analysis of mobile devices, especially older models like the iPhone 5c. The paper suggests that similar methodologies could be extended to later iPhone models using comparable NAND technologies, albeit with increased complexity due to more sophisticated protection mechanisms.

Theoretically, the paper raises questions regarding the robustness of current NAND memory security measures and the need for more advanced tamper-evident designs. Authors propose further research avenues including automation of the NAND mirroring process, exploring alternative access methods to avoid physical alterations, and developing improved algorithms for passcode entry automation.

Conclusion

Skorobogatov's research underscores the vulnerabilities in consumer device security rooted in NAND Flash memory techniques. The paper provides a foundation for future studies aiming to enhance hardware security mechanisms. It also highlights the importance of using stronger passcodes and advocates for integrating robust hardware-software security protocols to mitigate potential exploitation via similar methodologies. The insights offered challenge both the hardware security practices of device manufacturers and the forensic methodologies employed by law enforcement, marking a significant contribution to the field of hardware security exploitation.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Youtube Logo Streamline Icon: https://streamlinehq.com

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube