PlayStation 4 Extraction

This was a really fun project! Peering inside chips is mesmerizing – it reveals an intricate, nanoscale world of circuits and patterns, turning technology into art. Since the PS4 is now over 10 years old, and this information is common inside the scene – I thought I would share some images.

Backside IR laser imaging

The PS4 does not encrypt the bootrom or efuses at rest. So they can be extracted using common imaging techniques (ie scanning electron microscope). The AM32 bootrom (LM32 variant) loads a second bootloader called the secure loader, which starts the rest of the system. The Secure Asset Management Unit (SAMU), a separate security co-processor, has all the goodies. The SAMU works together with the Crypto-Co Processor (CCP).

Bootrom TSMC 28nm

The bootrom was analyzed to discover fault injection locations.

All three fuse blocks

If you dump a consoles efuses, combined with the flashdump, you can derive all the necessary certs/keys. Do you remember Xbox 360 KeyVaults?

(un)blown fuses

The price of imaging is cheap, but delayering can be expensive and takes specific equipment – like a 5 axis polishing machine. The technician must keep the sample planar while removing more than ten copper layers. All in all, these days the whole process will run you about $4k, probably less if done in China.

It is very plausible that some console hacking groups have found ways to dump fuses while still keeping the console intact. It amazes me the absurd bugs people find in Sony/AMD systems. For example, the CCP bug flatz shared or the fail0verflow PSVR FIGO authentication bug. I haven’t followed PS5 hacking but I read their hypervisor implementation was broken via sleep mode? You never know until you look hard enough.


Comments

2 responses to “PlayStation 4 Extraction”

  1. Hello,
    I also had the idea to extract the fuses via decap, however I dont have any Tools or knowledge about this. Do you know someone I could send my cpu too?

    I really like this Blog post, the crypto stuff is really interesting.

    Best, Nevio

  2. Thanks so much for this nice article, I hope that if you can give more info about how you analyzed this images and how you extracted ROM and other secrets.
    Also btw I have a target SoC that I want to do same with it, so can you recommend a lab to help me doing this.

Leave a Reply

Your email address will not be published. Required fields are marked *