Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
???
02/26/08 17:15
Read: times


 
#151493 - not only...
Responding to: ???'s previous message
Lynn Reed said:
The idea of a self-destructing chip is interesting. The key is to prevent it from destroying itself during normal operation of your design.

Oh, not only that - the key is also to desctruct the chip and data irreversibly and unrecoverably. That's a less trivial undertaking than it might seem at the first glance - again, see the published papers of the Cambridge security group.

Not to speak about other ways how to bypass any cunning security scheme. This is the classical arms race - the designer has not only to invent a security scheme, but have also the imagination of the intruders and try to circumvent his own traps at all costs...

And, all this is really far from what the average embedded engineer here expects when speaking about code security...


---
As far as brute-force copying is concerned - I simply don't believe this does not evolve together with the evolution of the microelectronic technology. An average scanning electron microscope is not rocket science and might be well within the reach of a "specialised lab". It's then "just" a matter of proper choice of modes of operation and a bit of software to get a proper contrast from each layer, and perhaps even the state of charge of individual FLASH cells (if it comes to that). I believe investment into such a setup may be easily beyond several megabucks, but what I am reading now on the net makes me believe that the "routine job" in these "labs" tends to be cheaper than one would like to admit.

Again and again, this is all only question of money and the balancing of the said equation. And I am trying to find out at least the order of magnitude of the unknowns, to be able to solve it...

JW


List of 22 messages in thread
TopicAuthorDate
Obtaining maximum code security            01/01/70 00:00      
   Worth it ?            01/01/70 00:00      
      Protection with Patents            01/01/70 00:00      
   the value... again...            01/01/70 00:00      
      "OCR"ing a Design            01/01/70 00:00      
   It's a brave man            01/01/70 00:00      
      Specialist secure micros            01/01/70 00:00      
         this is a different form of security            01/01/70 00:00      
         Huge NREs?            01/01/70 00:00      
            What if you don't bond out nPSEN?            01/01/70 00:00      
               why not drop !EA            01/01/70 00:00      
                  Don't Drop !EA!            01/01/70 00:00      
                     Couldn\'t you do that in another way            01/01/70 00:00      
                        Eliminating /EA            01/01/70 00:00      
               The value of PSEN            01/01/70 00:00      
            not only...            01/01/70 00:00      
               Brute-force copying            01/01/70 00:00      
                  well, maybe...            01/01/70 00:00      
            Erase on tamper detect            01/01/70 00:00      
   Make the chip hard to access            01/01/70 00:00      
      It's quite impractical...            01/01/70 00:00      
   few thousand dollars ... Not at all            01/01/70 00:00      

Back to Subject List