I need an advice please.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

I need an advice please.

2,526 Views
elis
Contributor I
Hey fellows,
Actually i been hired by a small company which has a product based on MC68HC908JBXX MCU, the previous employee been fired recently and took with him all sources he wrote, my boss said that he don't want to invest in new developing, but we urgently need  the abiliy to duplicate same MCU content for clear one (even without understanding content).
Could you please point me for a programmer instrument which able to dump MC68HC908JBXX memory content (read it byte by byte), then write it to same clear  MCU one (taking on consideration  that original MCU using different security methods)?, .
I will appreciate any reply.
Thanks in Advance
Elis
Labels (1)
0 Kudos
Reply
6 Replies

785 Views
rocco
Senior Contributor II
Hi, Elis:

To elaborate on what Mac said, the HC908JBxx chips are secure by default. I'm sorry to say that unless you have an .s19 file or other memory image file, it is unlikely you will be able to copy what is in the chip.
0 Kudos
Reply

785 Views
elis
Contributor I
Unfortunately no .S19 file or other memory image file exist.
-Could you please broaden about this default secutity technology behind those bits?,what is the real  difficulty to read them in mirror?
-Any recommended programmer which can assist me to pass this barrier( or part of it)?.
 
-Any tips will be welcome
 
Thanks in advance
 
Elis
0 Kudos
Reply

785 Views
peg
Senior Contributor IV
Hi,
You cannot gain access to this device without either going through the correct procedure and transmitting the 8-byte security code to it or mass erasing it.
It will be far easier to persue legal action against the ex-employee and fix the slack/non-existant business practices of the company involved than attempt to break in!
 
Regards
Peg
 
0 Kudos
Reply

785 Views
Nevo
Contributor I
It sounds like it might be time for your boss to call the company's legal advisor.
0 Kudos
Reply

785 Views
rocco
Senior Contributor II
Hi, Elis:

The locations that Mac mentioned are not only used as interupt vectors, but are also used as a 64-bit security-key when entering monitor-mode. It's purpose to to prevent someone from copying your firmware design.

When a device is not blank, the chip will not let you access the flash unless you supply it with those eight bytes, in order to "unlock" it, when entering monitor-mode. Once you supply those eight bytes, you can read and reprogram the flash in monitor-mode.

If the eight bytes you supply do not exactly match those eight bytes in the interrupt vector area, the only flash operation the chip will allow you to perform in monitor-mode is "mass-erase".
0 Kudos
Reply

785 Views
bigmac
Specialist III
Hello Elis,
 
To unlock the security feature of the HC908 device, and access the code within a programmed device using monitor mode, you will need to ascertain the values of the eight bytes from address $FFF6 to $FFFD.  These are interrupt vectors, and will correspond to the address of four different interrupt service routines within the code.
 
These vectors are -
$FFF6  TIM Ch0 vector
$FFF8  IRQ vector
$FFFA  USB vector
$FFFC  SWI vector
 
How were the devices programmed in the first instance?  If a .S19 file is still in existence, this may be used to program new devices, without the need of the other source files.
 
Regards,
Mac
 
0 Kudos
Reply