Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
???
02/26/08 07:40
Read: times


 
#151469 - the value... again...
Responding to: ???'s previous message
Lynn Reed said:
Still, the code is in a flash, and any die can be cut open and its memory read by any failure analysis lab in a few weeks for a few thousand dollars.

It's worse than that. There appear to be "labs" building up expertise on particular chips to be routinely "unlocked" by low-cost non-intrusive techniques. Also, these "services" are often run in countries where the cost of labour is low. This all might decrease the value of the common lockbit maybe an order of magnitude lower.

The trouble (for the user, but maybe even for the manufacturer) is to get an appropriate assesment on this value for a given chip/design.

Lynn Reed said:
But if I synthesize the program into gates, and use a few other layout encryption tricks, I can raise the cost of reverse engineering the code into years and millions of dollars.

Can you? I do respect your expertise, but, from the viewpoint of a (potential) customer, what are the assurances there is no single point of vulnerability in your scheme? As with a new firmware the layout would be presumably completely different, this should potentially be reviewed for each new design. This does not sound to be too cheap.

Also, does the mega$ pricetag apply also to 1:1 copy of the chip (by selective removal of layers and "OCR"ing)? Below, you mentioned also some checksumming scheme. Would you, as the chip manufacturer, take some guarantee that this step won't leak out the code?

Etc.etc.etc.

Lynn Reed said:
The disadvantages for this approach are that the code is now hard encoded, it takes 8 weeks to get parts, and that it gets expensive for low volumes < 3K. At 10K units, it would probably add $2 to the unit cost.


This is not quite a correct statement as far as security is concerned. This is an new approach - and new modes of failure of the whole scheme will emerge. Just an example - the mcu would now represent the value of the product, i.e. it's not the $$ part anymore, it's value is suddenly $$$-$$$$. So, it has to be handled appropriately, each individual piece. And the manufacturer suddenly has to deal with a stock of 10k or so of the mcus, with a lump value easily reaching up to mega$s - this certainly represents a personal, logistical and - again - security problem.


All this said, I don't say this is not an option. And, I would like to thank you for throwing it up, although - sitting on the "garage" side of the business - it's unlikely I will ever be able to use it.

However, at the end of the day, it has to be understood that there is nothing like absolute security, and that equation of many variables and unknowns has to be solved for each and every individual case, again and again.

Jan Waclawek


List of 22 messages in thread
TopicAuthorDate
Obtaining maximum code security            01/01/70 00:00      
   Worth it ?            01/01/70 00:00      
      Protection with Patents            01/01/70 00:00      
   the value... again...            01/01/70 00:00      
      "OCR"ing a Design            01/01/70 00:00      
   It's a brave man            01/01/70 00:00      
      Specialist secure micros            01/01/70 00:00      
         this is a different form of security            01/01/70 00:00      
         Huge NREs?            01/01/70 00:00      
            What if you don't bond out nPSEN?            01/01/70 00:00      
               why not drop !EA            01/01/70 00:00      
                  Don't Drop !EA!            01/01/70 00:00      
                     Couldn\'t you do that in another way            01/01/70 00:00      
                        Eliminating /EA            01/01/70 00:00      
               The value of PSEN            01/01/70 00:00      
            not only...            01/01/70 00:00      
               Brute-force copying            01/01/70 00:00      
                  well, maybe...            01/01/70 00:00      
            Erase on tamper detect            01/01/70 00:00      
   Make the chip hard to access            01/01/70 00:00      
      It's quite impractical...            01/01/70 00:00      
   few thousand dollars ... Not at all            01/01/70 00:00      

Back to Subject List