| ??? 02/26/08 16:54 Read: times |
#151492 - Don't Drop !EA! Responding to: ???'s previous message |
Latching the state of EA at reset fixes the security flaws found in the original Intel processors.
But I need to retain the ability to execute external code in order to test the processor. |
| Topic | Author | Date |
| Obtaining maximum code security | 01/01/70 00:00 | |
| Worth it ? | 01/01/70 00:00 | |
| Protection with Patents | 01/01/70 00:00 | |
| the value... again... | 01/01/70 00:00 | |
| "OCR"ing a Design | 01/01/70 00:00 | |
| It's a brave man | 01/01/70 00:00 | |
| Specialist secure micros | 01/01/70 00:00 | |
| this is a different form of security | 01/01/70 00:00 | |
| Huge NREs? | 01/01/70 00:00 | |
| What if you don't bond out nPSEN? | 01/01/70 00:00 | |
| why not drop !EA | 01/01/70 00:00 | |
| Don't Drop !EA! | 01/01/70 00:00 | |
| Couldn\'t you do that in another way | 01/01/70 00:00 | |
| Eliminating /EA | 01/01/70 00:00 | |
| The value of PSEN | 01/01/70 00:00 | |
| not only... | 01/01/70 00:00 | |
| Brute-force copying | 01/01/70 00:00 | |
| well, maybe... | 01/01/70 00:00 | |
| Erase on tamper detect | 01/01/70 00:00 | |
| Make the chip hard to access | 01/01/70 00:00 | |
| It's quite impractical... | 01/01/70 00:00 | |
few thousand dollars ... Not at all | 01/01/70 00:00 |



