element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • About Us
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Publications
  • Learn
  • More
Publications
Blog Securing our World and our Electronics
  • Blog
  • Documents
  • Events
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Publications to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: sciguy14
  • Date Created: 14 Jul 2011 4:57 AM Date Created
  • Views 760 views
  • Likes 0 likes
  • Comments 2 comments
  • jblum:dit
  • security
  • ic
  • rfid
  • biometric
  • cpu
  • magic_smoke
Related
Recommended

Securing our World and our Electronics

sciguy14
sciguy14
14 Jul 2011

I'm fairly new to the security sector, so I've been brushing up on my security factoids.  In this post, I talk about some of the most interesting chip-level security systems that I've found.  I'd love to hear about any neat security measures that you've dealt with!

 

image

Image Courtesty of the US Army


There’s no doubt that we are living in troubled times.  Every day, there seems to be another news report explaining the most recent security breach, newest terrorist threat, or next major international crisis.  At the heart of many of these problems lies security.  “Security” is a pretty broad term, and can refer to a lot of different issues and circumstances.  For now, let’s focus on access and system-level security.  This refers to the steps that are taken to ensure that only people with the proper credentials are given access to specific data or resources.  When access security is breached, it means that an unauthorized person has gained access to data or resources that they should not have.  This might then be traded, sold, or otherwise utilized to incite criminal activities or other forms of malfeasance. In the ideal scenario, we want to prevent these security breaches on the physical and technological levels.
 
My recent element14 video tutorial explaining RFID tag reading got me thinking about how we secure our electronics and our data.  There are obviously physical security layers such as guards, locked doors, and biometric scanners, but the more commonly attacked layer of security is the kind that occurs at the system level.  System security measures can range from good coding practices to microchips that are capable of destroying themselves when they detect unauthorized access.
 
Let’s start by looking at my favorite form of electronic security: self-destruction.  Some integrated circuits feature a self-destruct mechanism that will fry the chip and any sensitive memory when it detects tampering.  The MAXQ1740 (an IC for reading magnetic cards), for example, will destroy itself when it detects attempted hardware tampering.  Thankfully, that is a last ditch scenario – it also utilizes AES encryption and scrambling to occlude sensitive data like credit card numbers from being accessed by an unauthorized party.
Importantly, hackers don’t necessarily always simply want access to EEPROM non-volatile memory where things like password hashes might be stored.  A common hardware attack involves finding a way to dump the program firmware from a microcontroller.  Once that’s been done, it can be manipulated to run additional routines, access secure memory, or to report sensitive data back to a hacker.  Sometimes, competitors will want to steal firmware source code to identify proprietary algorithms used in another manufacturer’s CPU.  Physical die coating, bus scrambling, and encryption keys are generally used to prevent physical probing and analysis of a chip.
 
Various additional forms of security are often applied at the software, system, and network levels.  At the system level, some form of encryption is generally employed, where only the end-nodes of a communication system hold a key to unscramble transmitted data.  Since the data is transmitted in a scrambled state and requires a key to decode, it isn’t possible to eavesdrop on anything useful.  A hacker can attempt to acquire the secret key, but that would require gaining access to the firmware as described previously.
 
Network security can be particularly daunting, because it’s difficult to identify the “weakest link” that could lead to a breach.  For this reason, organizations often employ the “honey pot” approach, where an intentionally crippled system is left partially exposed to lure in hackers.  System administrators can then often trace individuals trying to break into the dummy system.
 
How does this all come back to Electrical Engineering?  While software security is critical to building safe systems, security always eventually comes back to the chips themselves.  If the hardware running the system includes bugs that could allow data to be read off directly, then all software defenses become useless.  There’s an interesting balance between creating well-crafted hardware, and secure hardware.  It’s often necessary to obfuscate integrated circuit design in order to improve physical chip security.  The balance should be chosen based on the scope of the project; it is important to ensure that the design remains understandable to potential new developers, while effectively stumping potential system hackers.  What are your thoughts on system security?  Do you stick to good coding practices, or do you implement protection in your hardware as well?  How much security is too much, and in what scenarios can you ignore it all together?
  • Sign in to reply
  • sciguy14
    sciguy14 over 14 years ago in reply to Eavesdropper

    I certainly agree that nothing is ever completely safe.  The medical stuff is downright scary.  As we integrate electronics closer and closer with our bodies, the lines between hacking and assault blur pretty quickly...

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Eavesdropper
    Eavesdropper over 14 years ago

    I have met countless individuals that will always seek to defeat the greatest of security measures (chip de-capping, code break, general hacking). Perhaps it is just human nature to overcome the impossible. Like Everest.

     

    Some people fear medical device tampering. Like a wireless manipulation of a pace maker, made to shock or stop a heart.

     

    Security is big business and big money. Put enough fear in people, a panic room is installed in every home.

     

    In this old element14 conversation, it seems the consensus is 'nothing is completely protected, but let's make it as hard as possible to steal."

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube