| ??? 02/26/08 12:01 Read: times |
#151478 - this is a different form of security Responding to: ???'s previous message |
Oliver Sedlacek said:
There are a number of specialist secure micros on the market, mostly aimed at 'chip-and-pin' and smartcard applications. Maxim-Dallas do some, and it's well worth reading their security notes, such as app note 3824 The Dallas chips implement a slightly different form of security than the smartcards. What Dallas is attempting to do is a device which is always alive and can actively monitor its environment, where the vulnerable parts sit. This is an order of magnitude more complex (read: expensive) than the "passive" forms of security. Oh, and even they did it wrong - see the famous Markus Kuhn's thesis. What we need is most of the time the smartcard-type security, i.e. preventing code extraction on a device fully available to the intruder. JW |
| Topic | Author | Date |
| Obtaining maximum code security | 01/01/70 00:00 | |
| Worth it ? | 01/01/70 00:00 | |
| Protection with Patents | 01/01/70 00:00 | |
| the value... again... | 01/01/70 00:00 | |
| "OCR"ing a Design | 01/01/70 00:00 | |
| It's a brave man | 01/01/70 00:00 | |
| Specialist secure micros | 01/01/70 00:00 | |
| this is a different form of security | 01/01/70 00:00 | |
| Huge NREs? | 01/01/70 00:00 | |
| What if you don't bond out nPSEN? | 01/01/70 00:00 | |
| why not drop !EA | 01/01/70 00:00 | |
| Don't Drop !EA! | 01/01/70 00:00 | |
| Couldn\'t you do that in another way | 01/01/70 00:00 | |
| Eliminating /EA | 01/01/70 00:00 | |
| The value of PSEN | 01/01/70 00:00 | |
| not only... | 01/01/70 00:00 | |
| Brute-force copying | 01/01/70 00:00 | |
| well, maybe... | 01/01/70 00:00 | |
| Erase on tamper detect | 01/01/70 00:00 | |
| Make the chip hard to access | 01/01/70 00:00 | |
| It's quite impractical... | 01/01/70 00:00 | |
few thousand dollars ... Not at all | 01/01/70 00:00 |



