PostHeaderIcon Extract IC Flash

Extract IC Flash memory content and copy code to new MCU memory which will provide the same functions as original Microcontroller;

Extract IC Flash memory content and copy code to new MCU memory which will provide the same functions as original Microcontroller

Extract IC Flash memory content and copy code to new MCU memory which will provide the same functions as original Microcontroller

To conduct the ic flash extraction, the ic attacker one needs to collect a set of messages, together with their processing time, e.g. question-answer delay. Many cryptographic algorithms were found to be vulnerable to timing ic cracks. The main reason why this happens is in the software implementation of each algorithm.

That includes performance optimisation to bypass unnecessary branching and conditional operations, cache memory usage, non-fixed time processor instructions such as multiplication and division, and a wide variety of other causes. As a result performance characteristics typically depend on both the encryption key and the input data.

To prevent such MCU code restoration, the techniques used for blinding signatures can be used . The general idea is to prevent the attacker knowing the input to the modular exponentiation operation by mixing the input with a chosen random value.

Comments are closed.