??? 06/04/12 16:32 Read: times |
#187611 - Who writes that crap? Responding to: ???'s previous message |
Richard Erlacher said:
In order to do this kind of hacking, the FPGA has to be removed from the target board and installed into a ZIF socket. So this requires: a) access to the target board (good luck with that) b) the ability to remove an SMT device from a board without damaging it (good luck with that) c) putting the part into a test jig with a ZIF socket (I suppose you could reball a BGA, but good luck with that) d) and then what? What's the intent? It's not like the hacker can remotely reprogram the FPGA to have to do some evil thing (like bring down a plane or focus a laser beam on the White House). The hacker needs to have access to the JTAG port in order to do anything malicious. Even if the hacker wanted to clone the device, he needs access to it. Anyways, the flash-based Actel FPGAs aren't the highest-security options. If you want that, you're into OTP devices (other Actel families, QuickLogic, certain Xilinx and Altera parts). -a |
Topic | Author | Date |
have you seen this? | 01/01/70 00:00 | |
Backdoor access | 01/01/70 00:00 | |
What's the big deal? | 01/01/70 00:00 | |
Crypto keys | 01/01/70 00:00 | |
High security chips | 01/01/70 00:00 | |
IP theft | 01/01/70 00:00 | |
as far as IP theft is concerned ... | 01/01/70 00:00 | |
Its really | 01/01/70 00:00 | |
Biggest problems is still processor copy-protection | 01/01/70 00:00 | |
so Mr Evil Hacker gets his keys | 01/01/70 00:00 | |
Mr Evil Hacker is most definitely busy | 01/01/70 00:00 | |
Who writes that crap? | 01/01/70 00:00 | |
Don't think so much about modification as in extraction | 01/01/70 00:00 | |
The people who write that crap... | 01/01/70 00:00 | |
c'mon, Jez! | 01/01/70 00:00 | |
Never mind who writes it .... | 01/01/70 00:00 | |
Right on! | 01/01/70 00:00 |