Any known problems w. Code Read Protection for LPC1769

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 

Any known problems w. Code Read Protection for LPC1769

2,442 次查看
stenlarsson
Contributor II

Here it demonstrated how code read protection (CRP) is bypassed on the "LPC family"
https://www.youtube.com/watch?v=98eqp4WmHoQ

Are ISP implementations different between different family members?

I am using LPC1769, are there any known CRP problems known for this device?

Is there any way I can make the power analysis (etc.) more difficult?

Thanks!

标签 (1)
3 回复数

1,657 次查看
ckphua
NXP Employee
NXP Employee

Apologies for the late response.

The LPC team is working on newer microcontrollers that are more resistant to such attack.

1,657 次查看
albertocapuzzo
Contributor I

It is really annoying that hackers spend so much time trying to compromise our embedded applications.  Similar to LPC, I found that STM32 family was recently hacked with a very similar method (https://www.aisec.fraunhofer.de/en/FirmwareProtection.html). 

Not to mention there’s a university team in Cambridge who has shared their experiences hacking lots of MCUs online (http://www.cl.cam.ac.uk/~sps32/NCL_2011.pdf)

I understand there’s a big difference between general purpose MCUs and tamper resistant MCUs for secure payments and transactions, but it’s still very frustrating.  As a developer, I seriously hope NXP and other manufacturers work to make their entry level micros more resistant to these hacking threats. 

0 项奖励

1,657 次查看
hparracho
Contributor II

The bypass method demonstrated in the video is known for a very long time.

Still, I find the simplicity of how it can be done and systematically repeated quite worrying.

The lack of response and action from NXP is nothing but disturbing too, to be honest!

0 项奖励