MCU crack chip decryption methods

Posted by

Source: IC declassified. The attacker took advantage of the loophole in the timing design of erasure operation of the series of microcontrollers. After erasing the encrypted lock bits, the self-programmed program was used to stop the next erasing operation of the on-chip program memory data, thus turning the encrypted microcontrollers into non-encrypted microcontrollers, and then using the programmer to read out the on-chip program.

2. Electronic detection attack usually monitors the analog characteristics of all power supply and interface connections when the processor is in normal operation with high time resolution, and attacks are carried out by monitoring its electromagnetic radiation characteristics. Because MCU is an active electronic device, when it executes different instructions, the corresponding power consumption also changes accordingly. In this way, by using special electronic measuring instruments and mathematical statistical methods to analyze and detect these changes, the specific key information in the MCU microcomputer can be obtained.

3. Fault Generation Technology This technology uses abnormal working conditions to make the processor error, and then provides additional access to attack. The most widely used means of attack include voltage impact and clock impact. Low voltage and high voltage attacks can be used to prohibit protection of circuits or force processors to perform erroneous operations. Clock transient hopping may reset the protection circuit without damaging the protected information. The transient hopping of power and clock can affect the decoding and execution of single instruction in some processors.

4. Probe technology. This technology directly exposes the internal connection of the chip, and then observes, manipulates and interferes with the microcontroller to achieve the purpose of attack.

Leave a Reply

Your email address will not be published. Required fields are marked *