Any known problems w. Code Read Protection for LPC1769

cancel
Showing results for 
Search instead for 
Did you mean: 

Any known problems w. Code Read Protection for LPC1769

873 Views
Contributor II

Here it demonstrated how code read protection (CRP) is bypassed on the "LPC family"
https://www.youtube.com/watch?v=98eqp4WmHoQ

Are ISP implementations different between different family members?

I am using LPC1769, are there any known CRP problems known for this device?

Is there any way I can make the power analysis (etc.) more difficult?

Thanks!

Labels (1)
3 Replies

88 Views
NXP Employee
NXP Employee

Apologies for the late response.

The LPC team is working on newer microcontrollers that are more resistant to such attack.

88 Views
Contributor I

It is really annoying that hackers spend so much time trying to compromise our embedded applications.  Similar to LPC, I found that STM32 family was recently hacked with a very similar method (https://www.aisec.fraunhofer.de/en/FirmwareProtection.html). 

Not to mention there’s a university team in Cambridge who has shared their experiences hacking lots of MCUs online (http://www.cl.cam.ac.uk/~sps32/NCL_2011.pdf)

I understand there’s a big difference between general purpose MCUs and tamper resistant MCUs for secure payments and transactions, but it’s still very frustrating.  As a developer, I seriously hope NXP and other manufacturers work to make their entry level micros more resistant to these hacking threats. 

0 Kudos

88 Views
Contributor II

The bypass method demonstrated in the video is known for a very long time.

Still, I find the simplicity of how it can be done and systematically repeated quite worrying.

The lack of response and action from NXP is nothing but disturbing too, to be honest!

0 Kudos