Background of the problem: There is an MCU (ASIL D), after the chip configuration encryption, the debug is not open to the public. Hackers download the protocol by analyzing the protocol: when the program runs to perform ID port verification, a high-voltage pulse is applied to the MCU power supply pin, and the MCU function will have a one-in-thousandth probability of error, and the ID check will be skipped. Hackers will take advantage of this to read out the firmware.
Issue:
(1) Does the S32K3 series also have such risks?
(2) If not, are there protective measures against this risk? How is it protected?
问题背景:有一款MCU(ASIL D),在芯片配置加密后,debug对外不开放。黑客通过分析下载协议:当程序跑到要进行ID口校验的时候,对MCU供电引脚施加高压脉冲,MCU功能会有千分之一概率出错,就会跳过ID检查。黑客会趁此读出固件。
问题:
①S32K3系列是否也存在这类风险?
②如不存在,是否有针对这一风险有防护措施?如何防护的?