2015-09-28 12:58 PM
There are facilities in china where you can hire resources for 200 US dollars an hour to reverse engineer microprocessors even if the flash protection bits are set or fuses blown - for example one technique is to pop the lid, isolated the program counter and increment it to scan through memory on the CPU buses (using dual beam fib/sem equipment and laying down platinum circuitry with the beam). I once got a quote of USD 16k to reverse engineer an F2.
I was just wondering how secure f2/f4 is when all is said and down. I know there are things we can do like tie each image to a given chip by matching against the hash of the unique id (because using the id straight would be too easy to find in the raw hex). Wondering if there are any other interesting tricks or features, and also interested to see if there are any horror stories here of people having their (f2/f4) products cloned?Thanks2015-09-29 02:40 AM
ST's own ST-Link v2 was dumped and cloned (or maybe extracted from the update package, I don't know), But I'm sure there is no 100% secure way of protecting your firmware against serious adversary, though ST's
should be good enough for regular cloners. So don't bother protecting, just go open source ;) P.S. This was just my opinion, I don't have actual information whether ST's protection is 100% secure or not.2015-09-29 03:48 AM
ST's own ST-Link v2 was dumped and cloned (or maybe extracted from the update package, I don't know), But I'm sure there is no 100% secure way of protecting your firmware against serious adversary, though ST's
should be good enough for regular cloners. So don't bother protecting, just go open source ;)I basically agree with this opinion. If your project is commercial, keep the development going, to be ahead of the copyists. You might approach ST directly, and given enough momentum (bought silicon p.a.), you might get a satisfying answer. But even ST will admit they can just raise the bar substantially, but not prevent attacks with ''unlimited'' ressources. Microchip is said to have elaborate methods to keep physical reverse-engineering at bay, but I view their portfolio as heading towards a dead end - but that is just my opinion, too.
2015-09-29 04:00 AM
2015-09-29 04:08 AM
Hi new guy,
There are some preventive actions based on protection techniques that you may apply to secure your device.I recommend you have a look to ''http://www.st.com/web/en/catalog/tools/FM147/CL1794/SC961/SS1743/LN1920/PF262417
''.It may help you to to select the appropriate way in order to protect your code.-Mayla-To give better visibility on the answered topics, please click on Accept as Solution on the reply which solved your issue or answered your question.
2015-09-29 09:06 AM
Surely someone with enough motivation and equipment could read the charge levels off the flash array, or break enough cells in the design to access the content.
People have broken smart cards with equipment in their basement.2015-09-29 10:17 AM
2015-09-29 10:20 AM