<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>8-bit MicrocontrollersのトピックRe: MC9S08 &amp; backdoor security key</title>
    <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126720#M1188</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;Hi Rob,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The old HC08 security method was handy in that it had a fixed, externally accessable&amp;nbsp;entry method. You just needed to know the code do the procedure and your in.&lt;/DIV&gt;&lt;DIV&gt;This allowed the tool makers (e.g. P&amp;amp;E) to implement security bypass into their tools. Even so far as to extract the code from an S19 for you. All you needed was the source code or FLASH image.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The S08 while the entry mode is fixed it CANNOT&amp;nbsp;be executed from outside. The procedure must be carried out from inside by code YOU write. This allows the level of security to be enhanced greatly, by you. This however means it is now impossible for the tool makers to provide any backdoor support as they don't know what you have done.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Now I'm not suggesting that this is the only reason but I wonder how much of these changes is to do with legal liability issues. Now Freescale have allowed you to build security on top of theirs does this then absolve them. "Why didn't you build a good secure method on top of ours?" Also I suppose the tool makers could provide a lower level of security by providing a simple standard method that you could implement within your code and that they could then provide support for. This would give similar level of security than before. However these days being nice has legal ramifications.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;As I showed in the thread you referenced backdoor access can be made as simple as pressing a button or as complicated as you like. Press a button send a byte over SCI wait between 3 and 4 seconds then send another etc etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Another issue is that before the device was secured by default and you could not forget the method or key for access. Idiot proof!!??&lt;/DIV&gt;&lt;DIV&gt;Now you need to deliberately secure the device, provide a key, then remember the key and the access method.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Oh, and to answer your specific question at the end......&lt;/DIV&gt;&lt;DIV&gt;Yes you can use the backdoor facility to access a secure device and read all FLASH and RAM which of course includes the sections you have used for EEPROM emulation.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Message Edited by peg on &lt;SPAN class="date_text"&gt;2007-03-17&lt;/SPAN&gt;&lt;SPAN class="time_text"&gt;11:34 AM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Message Edited by peg on &lt;SPAN class="date_text"&gt;2007-03-17&lt;/SPAN&gt;&lt;SPAN class="time_text"&gt;06:46 PM&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 17 Mar 2007 06:50:36 GMT</pubDate>
    <dc:creator>peg</dc:creator>
    <dc:date>2007-03-17T06:50:36Z</dc:date>
    <item>
      <title>MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126719#M1187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hello, all.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Rather than ask rambling vague questions, let me tell you what I want to do. I have EEPROM emulation in Flash working now in my MC9S08QGx. I also have this working on some older MC908QTx (non-S family) boards too.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The great thing about the QT family security mechanism was that the boot vectors doubled as a security code. With my P&amp;amp;E Micro programmer, I could very easily read the contents of the user flash, e.g., all that EEPROM-like user data. The "history" of the board could be read. This has proved to be a great troubleshooting tool.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;On the newer 9S08 boards, I don't believe I have this option, at last with P&amp;amp;E tools. I've asked &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.nxp.com/external-link.jspa?url=http%3A%2F%2Fwww.pemicro.com%2Fforums%2Findex.php%3Fshowtopic%3D1552%26hl%3Dbackdoor" rel="nofollow" target="_blank"&gt;the question over at the P&amp;amp;E forums&lt;/A&gt;&lt;SPAN&gt;, and one of their tech support people verified that suspicion.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;But I'm very curious about the backdoor security key feature in the S family. I've read &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.nxp.com/external-link.jspa?url=http%3A%2F%2Fforums.freescale.com%2Ffreescale%2Fboard%2Fmessage%3Fboard.id%3D8BITCOMM%26message.id%3D3719%26query.id%3D45795%23M3719" rel="nofollow" target="_blank"&gt;this post&lt;/A&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.nxp.com/external-link.jspa?url=http%3A%2F%2Fforums.freescale.com%2Ffreescale%2Fboard%2Fmessage%3Fboard.id%3D8BITCOMM%26message.id%3D3398%26query.id%3D45795%23M3398" rel="nofollow" target="_blank"&gt;this post&lt;/A&gt;&lt;SPAN&gt;, but I'm still foggy.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;From the datasheet (page 50), it sounds to me like this should be possible:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;...a secure user program can temporarily disengage security by: 2. Writing the user-entered key values to the NVBACKKEY through NVBACKKEY+7 locations... User software normally would get the key codes from outside the MCU system through a communication interface such as a serial I/O.&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;So can I do what I want in the 9S08 -- secure the flash, yet read back the stored user data later with the backdoor key?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2007 03:49:12 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126719#M1187</guid>
      <dc:creator>irob</dc:creator>
      <dc:date>2007-03-17T03:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126720#M1188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;Hi Rob,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The old HC08 security method was handy in that it had a fixed, externally accessable&amp;nbsp;entry method. You just needed to know the code do the procedure and your in.&lt;/DIV&gt;&lt;DIV&gt;This allowed the tool makers (e.g. P&amp;amp;E) to implement security bypass into their tools. Even so far as to extract the code from an S19 for you. All you needed was the source code or FLASH image.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The S08 while the entry mode is fixed it CANNOT&amp;nbsp;be executed from outside. The procedure must be carried out from inside by code YOU write. This allows the level of security to be enhanced greatly, by you. This however means it is now impossible for the tool makers to provide any backdoor support as they don't know what you have done.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Now I'm not suggesting that this is the only reason but I wonder how much of these changes is to do with legal liability issues. Now Freescale have allowed you to build security on top of theirs does this then absolve them. "Why didn't you build a good secure method on top of ours?" Also I suppose the tool makers could provide a lower level of security by providing a simple standard method that you could implement within your code and that they could then provide support for. This would give similar level of security than before. However these days being nice has legal ramifications.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;As I showed in the thread you referenced backdoor access can be made as simple as pressing a button or as complicated as you like. Press a button send a byte over SCI wait between 3 and 4 seconds then send another etc etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Another issue is that before the device was secured by default and you could not forget the method or key for access. Idiot proof!!??&lt;/DIV&gt;&lt;DIV&gt;Now you need to deliberately secure the device, provide a key, then remember the key and the access method.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Oh, and to answer your specific question at the end......&lt;/DIV&gt;&lt;DIV&gt;Yes you can use the backdoor facility to access a secure device and read all FLASH and RAM which of course includes the sections you have used for EEPROM emulation.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Message Edited by peg on &lt;SPAN class="date_text"&gt;2007-03-17&lt;/SPAN&gt;&lt;SPAN class="time_text"&gt;11:34 AM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Message Edited by peg on &lt;SPAN class="date_text"&gt;2007-03-17&lt;/SPAN&gt;&lt;SPAN class="time_text"&gt;06:46 PM&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2007 06:50:36 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126720#M1188</guid>
      <dc:creator>peg</dc:creator>
      <dc:date>2007-03-17T06:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126721#M1189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;Great expertise, Peg, as usual. Thanks for your reply!&lt;BR /&gt;&lt;BR /&gt;It's beginning to sink in now. Let me see if I get this right: Due to the radically different architecture, a programmer such as P&amp;amp;E's can no longer directly unlock a part.&lt;BR /&gt;&lt;BR /&gt;Instead, the designer would have to make some sort of custom box (such as an RS232 terminal link) and then program the target to unlock with the use of the backdoor key under certain user conditions.&lt;BR /&gt;&lt;BR /&gt;At least it's still possible to reveal portions of the flash.&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2007 23:45:27 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126721#M1189</guid>
      <dc:creator>irob</dc:creator>
      <dc:date>2007-03-19T23:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126722#M1190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;Hi,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;To unlock the part, you need to write the backdoor key from within the software.&lt;/DIV&gt;&lt;DIV&gt;Therefore your software inside the MCU needs to have routines to prepare this.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;To be more flexible during development you could assign that an IRQ would start the unsecure sequence.&lt;/DIV&gt;&lt;DIV&gt;For more security, it is advised not to store the key in the MCU and to use a combination like SCI/SPI/msCAN to send it to the MCU and then a kind of command to execute the unsecure firmware you need to have planned.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Cheers,&lt;/DIV&gt;&lt;DIV&gt;Alban.&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 17:31:54 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126722#M1190</guid>
      <dc:creator>Alban</dc:creator>
      <dc:date>2007-03-20T17:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126723#M1191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Hello,&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Yet another possibility is to have the unlocking occur automatically (within the initialisation process) during the product development phase, and simply remove the unlocking code completely, once development is complete and the product is released.&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;For a product in the field, I wouldn't see any need for&amp;nbsp;debugging capability using BDM, assuming the existing code would be replaced if an update were to occur.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Regards,&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Mac&lt;/FONT&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 23:08:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126723#M1191</guid>
      <dc:creator>bigmac</dc:creator>
      <dc:date>2007-03-20T23:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126724#M1192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;Bigmac, except in the case of using the MCU's flash as EEPROM. When product comes back as RMA, for instance, it is helpful to examine its history. It would be helpful to unlock it, and view the saved user parameters.&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 23:21:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126724#M1192</guid>
      <dc:creator>irob</dc:creator>
      <dc:date>2007-03-20T23:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126725#M1193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Hello Rob,&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;I assume that the contents of the flash EEPROM require a much lower level of security than the program code.&amp;nbsp; So there may be alternative means of dumping the data, other than via the BDM.&amp;nbsp; Special SCI commands come to mind.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;The additional code required to do this might be of comparable complexity&amp;nbsp;to a "secret" mechanism&amp;nbsp;for entering the back-door key, but would leave the program code more secure.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Regards,&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Mac&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2007 23:47:06 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126725#M1193</guid>
      <dc:creator>bigmac</dc:creator>
      <dc:date>2007-03-20T23:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: MC9S08 &amp; backdoor security key</title>
      <link>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126726#M1194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;Hi,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Mac said:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Yet another possibility is to have the unlocking occur automatically (within the initialisation process) during the product development phase, and simply remove the unlocking code completely, once development is complete and the product is released.&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Not sure at all on the purpose of this. This is locking the door and leaving the key in, then throw the key away.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;How is this better than not locking the door then locking it never having had a key.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;then said:&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;EM&gt;For a product in the field, I wouldn't see any need for&amp;nbsp;debugging capability using BDM, assuming the existing code would be replaced if an update were to occur.&lt;/EM&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;This bit I agree with and is what my thinking and is what I have done.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;However, if I was using emulated EEPROM I think I would enable and implement backdoor access.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;On products where I implement a serial port I always implement a serial command that reads out RAM.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;This is very useful for some quick debugging with just a terminal. This sort of thing could easily be extended for the purposes of reading the "EEPROM" However...&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;Using backdoor access to read the "EEPROM" also allows checking failed units for memory corruption from failed/runaway "EEPROM" code and full code.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;This is because I have had this happen in the past when in-application programming was done.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;The difference in "complexity" to implement would depend on the complexity of the backdoor access. Backdoor could be simpler/smaller.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2007 05:19:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/8-bit-Microcontrollers/MC9S08-backdoor-security-key/m-p/126726#M1194</guid>
      <dc:creator>peg</dc:creator>
      <dc:date>2007-03-21T05:19:02Z</dc:date>
    </item>
  </channel>
</rss>

