Skip to main content

All Questions

1 vote
1 answer
136 views

Strategy against Side Channel Attack

I am newbie to Hardware Security. While studying Side Channel Attack, I realized that power consumption profile of electronic control unit is a key to encrypt what algorithm runs on it. I thought ...
emre iris's user avatar
  • 127
1 vote
1 answer
55 views

Side-channel leakage and instruction types on microcontrollers

Since the end of 90s, it is known that side-channels (e.g. execution time, power consumption, electromagnetic emanations) of computation platforms can be analysed to recover information on data being ...
Raoul722's user avatar
  • 113
2 votes
3 answers
1k views

How to prevent someone clone PIC [closed]

ACT 1 Okay I know there is code protection system on PIC. But it is preventing someone read the code, not copy. It looks still easy to clone and run on another circuit. Can you suggest another ...
Eren's user avatar
  • 21
1 vote
1 answer
892 views

Protect Code inside Microcontroller [closed]

As a preface, what I am asking is highly related to this question. That said, the question linked was asked in 2011 (7 years ago), and I imagine the microcontroller world has changed (at least to ...
Helpful's user avatar
  • 671
0 votes
3 answers
623 views

Controlling hardware with serial port [closed]

I initially posted this in SuperUser SE Site, but it was recommended that I bring it here instead. So, here we go :) We have a 'dated' security system at the office. It is a model that was made (or ...
Jason H.'s user avatar
1 vote
1 answer
90 views

Controller security

What is the general approach used by the military to safeguard controllers that fall into enemy hands? Let's say the controller needs to interpret radio / wireless signals to do it's job. But it ...
toddmo's user avatar
  • 113
1 vote
1 answer
191 views

How to ensure your MCU can't be reverse engineered?

I am building a project around an nRF51822 chip from Nordic, using the mbed prototyping platform. I would like to ensure that the code cannot be extracted / deduced from the project after it has been ...
George Edwards's user avatar
5 votes
3 answers
455 views

Large exponentials and 8-bit PIC processors

Does anyone know if 8-bit (PIC) processors could typically handle large exponentials, e.g., 5^15 mod 23, with a reasonable speed? Does doing so result in more ...
Kar's user avatar
  • 1,557