Chip decryption (MCU cracking) technical analysis

Publisher:科技先锋Latest update time:2014-01-14 Source: dqjsw Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

  Chip decryption is also called MCU cracking, MCU cracking, chip cracking, IC decryption. We usually call CPLD decryption and DSP decryption chip decryption. MCU attackers use special or homemade equipment, exploit vulnerabilities in MCU chip design or software defects, and use a variety of technical means to extract key information and obtain the program in the MCU, which is chip decryption technology.

  Chip decryption is an industry on the edge of the law, but everyone has their own opinion. The person in charge of Beijing Shousi Zhixin Technology said that chip decryption is just a knife, and there is no right or wrong in itself. However, it is who holds the knife and what they use it for that ultimately determines its nature.

  Aside from the nature of chip decryption, the chip decryption technology itself is also a sophisticated and complex high-end technology, which requires crackers to have solid reverse engineering knowledge and rich decryption experience. Otherwise, the decryption may fail, and the "mother chip" will be lost. General decryption methods include: software attack, electronic detection attack, fault generation technology and probe technology.

  Software attack techniques

  Software attack decryption technology is also known as soft decryption technology, which is to find out the design defects of the microcontroller through software and read out the internal OTP/falsh ROM or eeprom code. This chip decryption method is not the most ideal because the research time is too long and not every microcontroller in the same series is the same.

  Electronic detection attack technology

  Electronic detection attack technology usually monitors the analog characteristics of all power supplies and interface connections of the processor during normal operation with high time resolution, and implements the attack by monitoring its electromagnetic radiation characteristics. Because the microcontroller is an active electronic device, when it executes different instructions, the corresponding power consumption also changes accordingly. In this way, by using special electronic measuring instruments and mathematical statistical methods to analyze and detect these changes, specific key information in the microcontroller can be obtained.

  Chip decryption is also called MCU cracking, MCU cracking, chip cracking, IC decryption. We usually call CPLD decryption and DSP decryption chip decryption. MCU attackers use special or homemade equipment, exploit vulnerabilities in MCU chip design or software defects, and use a variety of technical means to extract key information and obtain the program in the MCU, which is chip decryption technology.

  Chip decryption is an industry on the edge of the law, but everyone has their own opinion. The person in charge of Beijing Shousi Zhixin Technology said that chip decryption is just a knife, and there is no right or wrong in itself. However, it is who holds the knife and what they use it for that ultimately determines its nature.

  Aside from the nature of chip decryption, the chip decryption technology itself is also a sophisticated and complex high-end technology, which requires crackers to have solid reverse engineering knowledge and rich decryption experience. Otherwise, the decryption may fail, and the "mother chip" will be lost. General decryption methods include: software attack, electronic detection attack, fault generation technology and probe technology.

  Software attack techniques

  Software attack decryption technology is also known as soft decryption technology, which is to find out the design defects of the microcontroller through software and read out the internal OTP/falsh ROM or eeprom code. This chip decryption method is not the most ideal because the research time is too long and not every microcontroller in the same series is the same.

  Electronic detection attack technology

  Electronic detection attack technology usually monitors the analog characteristics of all power supplies and interface connections of the processor during normal operation with high time resolution, and implements the attack by monitoring its electromagnetic radiation characteristics. Because the microcontroller is an active electronic device, when it executes different instructions, the corresponding power consumption also changes accordingly. In this way, by using special electronic measuring instruments and mathematical statistical methods to analyze and detect these changes, specific key information in the microcontroller can be obtained.

Baidu Button BEGIN
Reference address:Chip decryption (MCU cracking) technical analysis

Previous article:Learning experience of single chip microcomputer beginners
Next article:MCU Program Development

Latest Microcontroller Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号