Chip decryption is also called MCU cracking, MCU cracking, chip cracking, IC decryption. We usually call CPLD decryption and DSP decryption chip decryption. MCU attackers use special or homemade equipment, exploit vulnerabilities in MCU chip design or software defects, and use a variety of technical means to extract key information and obtain the program in the MCU, which is chip decryption technology.
Chip decryption is an industry on the edge of the law, but everyone has their own opinion. The person in charge of Beijing Shousi Zhixin Technology said that chip decryption is just a knife, and there is no right or wrong in itself. However, it is who holds the knife and what they use it for that ultimately determines its nature.
Aside from the nature of chip decryption, the chip decryption technology itself is also a sophisticated and complex high-end technology, which requires crackers to have solid reverse engineering knowledge and rich decryption experience. Otherwise, the decryption may fail, and the "mother chip" will be lost. General decryption methods include: software attack, electronic detection attack, fault generation technology and probe technology.
Software attack techniques
Software attack decryption technology is also known as soft decryption technology, which is to find out the design defects of the microcontroller through software and read out the internal OTP/falsh ROM or eeprom code. This chip decryption method is not the most ideal because the research time is too long and not every microcontroller in the same series is the same.
Electronic detection attack technology
Electronic detection attack technology usually monitors the analog characteristics of all power supplies and interface connections of the processor during normal operation with high time resolution, and implements the attack by monitoring its electromagnetic radiation characteristics. Because the microcontroller is an active electronic device, when it executes different instructions, the corresponding power consumption also changes accordingly. In this way, by using special electronic measuring instruments and mathematical statistical methods to analyze and detect these changes, specific key information in the microcontroller can be obtained.
Chip decryption is also called MCU cracking, MCU cracking, chip cracking, IC decryption. We usually call CPLD decryption and DSP decryption chip decryption. MCU attackers use special or homemade equipment, exploit vulnerabilities in MCU chip design or software defects, and use a variety of technical means to extract key information and obtain the program in the MCU, which is chip decryption technology.
Chip decryption is an industry on the edge of the law, but everyone has their own opinion. The person in charge of Beijing Shousi Zhixin Technology said that chip decryption is just a knife, and there is no right or wrong in itself. However, it is who holds the knife and what they use it for that ultimately determines its nature.
Aside from the nature of chip decryption, the chip decryption technology itself is also a sophisticated and complex high-end technology, which requires crackers to have solid reverse engineering knowledge and rich decryption experience. Otherwise, the decryption may fail, and the "mother chip" will be lost. General decryption methods include: software attack, electronic detection attack, fault generation technology and probe technology.
Software attack techniques
Software attack decryption technology is also known as soft decryption technology, which is to find out the design defects of the microcontroller through software and read out the internal OTP/falsh ROM or eeprom code. This chip decryption method is not the most ideal because the research time is too long and not every microcontroller in the same series is the same.
Electronic detection attack technology
Electronic detection attack technology usually monitors the analog characteristics of all power supplies and interface connections of the processor during normal operation with high time resolution, and implements the attack by monitoring its electromagnetic radiation characteristics. Because the microcontroller is an active electronic device, when it executes different instructions, the corresponding power consumption also changes accordingly. In this way, by using special electronic measuring instruments and mathematical statistical methods to analyze and detect these changes, specific key information in the microcontroller can be obtained.
Baidu Button BEGIN
Previous article:Learning experience of single chip microcomputer beginners
Next article:MCU Program Development
- Popular Resources
- Popular amplifiers
- Learn ARM development(16)
- Learn ARM development(17)
- Learn ARM development(18)
- Embedded system debugging simulation tool
- A small question that has been bothering me recently has finally been solved~~
- Learn ARM development (1)
- Learn ARM development (2)
- Learn ARM development (4)
- Learn ARM development (6)
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Microchip Accelerates Real-Time Edge AI Deployment with NVIDIA Holoscan Platform
- Microchip Accelerates Real-Time Edge AI Deployment with NVIDIA Holoscan Platform
- Melexis launches ultra-low power automotive contactless micro-power switch chip
- Melexis launches ultra-low power automotive contactless micro-power switch chip
- Molex leverages SAP solutions to drive smart supply chain collaboration
- Pickering Launches New Future-Proof PXIe Single-Slot Controller for High-Performance Test and Measurement Applications
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- The US asked TSMC to restrict the export of high-end chips, and the Ministry of Commerce responded
- The US asked TSMC to restrict the export of high-end chips, and the Ministry of Commerce responded
- CircuitPython Day
- Is there any problem with this anti-reverse circuit?
- Today at 10:00am, R&S will host a prize-winning live broadcast [HDMI 1.4b/2.1 interface test] (entry starts at 9:50am)
- How much do you know about impedance matching?
- DLP Dynamic Floor Projection Technology for Automotive Exterior Lighting
- 16 PCB welding defects! What are their hazards?
- I saw a post next door and it seems okay since I work there every day.
- EEWORLD University ---- PCB Design Video - Learn PADS PCB Design in 1 Day
- 【NUCLEO-L552ZE Review】-3: Arduino vs. Mbed?
- What is the reason why IIC fails when the MSP430FR2311 power supply voltage rises to 3.5V? How to solve it?