<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Defense against glitch attacks in LPC Microcontrollers</title>
    <link>https://community.nxp.com/t5/LPC-Microcontrollers/Defense-against-glitch-attacks/m-p/1013614#M39680</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi philip&lt;/P&gt;&lt;P&gt;For secure applications, NXP recommends programming CRP level 3 as you have already configured. Can you kindly enter a&amp;nbsp;&lt;SPAN style="font-size: 11.0pt; color: #4472c4;"&gt;&lt;A href="https://www.nxp.com/support/support:SUPPORTHOME"&gt;&lt;SPAN style="color: #4472c4;"&gt;support ticket&lt;/SPAN&gt;&lt;/A&gt; &lt;/SPAN&gt; with more details on your product security requirements so that we can propose the best options that may fit your needs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Mar 2020 15:55:34 GMT</pubDate>
    <dc:creator>vicentegomez</dc:creator>
    <dc:date>2020-03-11T15:55:34Z</dc:date>
    <item>
      <title>Defense against glitch attacks</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/Defense-against-glitch-attacks/m-p/1013613#M39679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using the LPC43S67 and encrypted code to prevent cloning of a product. CRP3 is set so I assume all is good and secure. However I saw a presentation at a security conference showing how to break NXP code read protection using a glitch attack. The presentation showed how quickly and easily CRP can be broken on the LPC1114. Is there anything that can be done to make this attack harder?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2020 10:41:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/Defense-against-glitch-attacks/m-p/1013613#M39679</guid>
      <dc:creator>philip_a_ocarro</dc:creator>
      <dc:date>2020-01-29T10:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: Defense against glitch attacks</title>
      <link>https://community.nxp.com/t5/LPC-Microcontrollers/Defense-against-glitch-attacks/m-p/1013614#M39680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi philip&lt;/P&gt;&lt;P&gt;For secure applications, NXP recommends programming CRP level 3 as you have already configured. Can you kindly enter a&amp;nbsp;&lt;SPAN style="font-size: 11.0pt; color: #4472c4;"&gt;&lt;A href="https://www.nxp.com/support/support:SUPPORTHOME"&gt;&lt;SPAN style="color: #4472c4;"&gt;support ticket&lt;/SPAN&gt;&lt;/A&gt; &lt;/SPAN&gt; with more details on your product security requirements so that we can propose the best options that may fit your needs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2020 15:55:34 GMT</pubDate>
      <guid>https://community.nxp.com/t5/LPC-Microcontrollers/Defense-against-glitch-attacks/m-p/1013614#M39680</guid>
      <dc:creator>vicentegomez</dc:creator>
      <dc:date>2020-03-11T15:55:34Z</dc:date>
    </item>
  </channel>
</rss>

