AnsweredAssumed Answered

Kinetis protection from reading firmware, decapping?

Question asked by arhi smece on Jul 3, 2017
Latest reply on Jul 4, 2017 by Jing Pan

Do Kinetis series of MCU's have the protective mesh on top of the mcu so probing after decap gets harder? (something TPU has for e.g.)


I have very little experience with secure applications and now I'm supposed to make device where it is very important firmware is not extracted so I was looking for different tamper proof solutions and found Kinetis to be interesting. K2 series especially, but I'm unable to find answer to two basic questions

1. how "tamper protection" actually works (can mcu detect tampering if there's no voltage source available? no battery backup, supercap etc? I guess cannot but .. read in few places that something is automatically erased on tamper so..). Some link to a document is highly appreciated


2. protection from break-ic, mikatech, mikahk and similar "services", what is the hardware protection of the kinetis mcu series? Is there a intrusion detection mesh on top of the die or anything else? Here: I read that there is " Active wire-mesh tamper detect " but I don't see anywhere what that actually is and how does it work?! so explanation or "where to read info about it" is appreciated

Cortex M4 with USB is what I am looking for 150-180MHz, ideally tqfp for start (later I can move to bigger ones with bga package but for initial tests tqfp is hand solderable) so a suggestion of "secure" chip if I'm not looking in the right direction ...