S32K Security risk assessment

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

S32K Security risk assessment

250 Views
hebi
Contributor I

Background of the problem: There is an MCU (ASIL D), after the chip configuration encryption, the debug is not open to the public. Hackers download the protocol by analyzing the protocol: when the program runs to perform ID port verification, a high-voltage pulse is applied to the MCU power supply pin, and the MCU function will have a one-in-thousandth probability of error, and the ID check will be skipped. Hackers will take advantage of this to read out the firmware.

Issue:

(1) Does the S32K3 series also have such risks?

(2) If not, are there protective measures against this risk? How is it protected?

问题背景:有一款MCU(ASIL D),在芯片配置加密后,debug对外不开放。黑客通过分析下载协议:当程序跑到要进行ID口校验的时候,对MCU供电引脚施加高压脉冲,MCU功能会有千分之一概率出错,就会跳过ID检查。黑客会趁此读出固件。

问题:

①S32K3系列是否也存在这类风险?

②如不存在,是否有针对这一风险有防护措施?如何防护的?

0 Kudos
0 Replies