IC decryption is mainly used on PCBA clone; it trends to be able to program research in the future. IC decryption is in addition generally known as MCU split and chip decryption, a process that harm use special devices to have key data on the nick by various technical methods. These methods are called IC decryption technologies. Right here we introduce many IC decryption technologies.

As a subject of fact, nick crack is a kind of accurate and complicated sophisticated science and technologies. https://pcb-reverse-engineering.com , digital detection attack, fault generated technology plus probe technique will be common IC decryption technologies. Now we all make a thorough introduction to all of them.
1 . Software attack

This technique means to find out MCU's design defect by way of softwares and go through out internal OTP/flash ROM or EEPROM code. This will be not a great IC decryption technology since it takes a lot of research time and even each chip along with the same collection is different.
2 . not Electronic detection attack

This method typically monitors simulation features of processor's just about all power supplies attaching with interfaces together with high time resolution; furthermore, it does attack by tracking its electromagnetic radiation characteristics. MCU is surely an active electronic part, when it works different instructions, the particular corresponding power intake also changes appropriately, so the key point information can become acquired by examining and detecting these kinds of changes with unique electronic measuring musical instruments and mathematical statistical methods.

3. Problem generated technological innovation

This specific IC decryption technologies uses abnormal doing work conditions to make processor error, and after that supplies additional entry to acquire information. The most extensively used fault developed attack methods consist of voltage surge, time clock shock; low voltage and high volt quality attack can get used to restrict protection circuit functioning or force cpu to execute defective operation. Clock transitive jump can reset the protection signal although not damage safeguarded information; power supply and clock transient jump can impact personal instruction decoding and even execution in certain processors.

4. Probe method

Probe technique and FIB technique will be popular IC decryption, but their expense is high. Probe method directly exposes chip's interconnect and next observes, controls and even interferes MCU in order to achieve attack. That mainly includes invasive attack and non-invasive attack.


トップ   編集 凍結 差分 バックアップ 添付 複製 名前変更 リロード   新規 一覧 単語検索 最終更新   ヘルプ   最終更新のRSS
Last-modified: 2024-04-30 (火) 20:58:37 (16d)