Skip to main content

Questions tagged [security]

The tag has no usage guidance.

19 questions with no upvoted or accepted answers
2 votes
0 answers
264 views

Randomize PCB trace generation with Altium Designer

We are trying to create a tamper mesh as a flex PCB. This tamper mesh will consist of around 10 signal traces in order to detect a tamper. One crucial point is that this tamper mesh should be ...
Maurice Pannard's user avatar
1 vote
0 answers
54 views

Has any implementation succeeded to have shared key inside chipset and protect it from exploits?

Since there is a lot of demonstration like using SEM (Scanning Electron Microscope) to read bits from ROM through the scanned image of chipset, is there any implementation that has managed to succeed ...
hurryman2212's user avatar
1 vote
0 answers
1k views

Connecting Protective Earth (PE) to DC ground

This question has a bit of application background so please bear with me: I'm working on a LED lighting system. The controller (MCU, led drivers and led supply) will be powered by a single DC ...
royconejo's user avatar
  • 143
1 vote
0 answers
146 views

What are some good resource for learning how car key and wireless door lock systems work?

I understand that most car keys include a 434MHz transmitter, as well as 125KHz RFID transponder. The 434MHz transmitter is used for operating the door locks, and the 125KHz RFID transponder is the ...
Ken Masterson's user avatar
0 votes
0 answers
136 views

How can a designer be sure to authorize only legit ICs? How is performed? How are cloned ICs prevented to be activated?

The above diagram is from the IC Activation (locking/unlocking) slide of Fighting against theft, cloning and counterfeiting of integrated circuits by Lilian Bossuet Associate Professor, CNRS Chaire of ...
allexj's user avatar
  • 55
0 votes
0 answers
35 views

BLE relay to control my garage door - security concerns

I would like to use Shelly 1PM Mini Gen3 to control my garage door. Since I do not have WiFi coverage in my garage I will rely on Bluetooth. However with this setup I am not sure if this Smart home ...
sidlo's user avatar
  • 101
0 votes
2 answers
54 views

Best way to use Driveay alert output (Open Collector NPN)

I'm learning as I go on this project. I have a beam-break driveway alert that I would like to get the output from on a device like an Arduino or Raspberry Pi and need some guidance on the best ...
sdg's user avatar
  • 1
0 votes
0 answers
62 views

how to determine what chip wire allows BIOS flashing?

how to determine what chip wire/leg allows BIOS flashing? I want to modify my MOBO to deny BIOS flashing. I only want it allowed when I really need to write on it. So, I need to know: if it is ...
VeganEye's user avatar
0 votes
0 answers
63 views

How safe is it to plug a resistor on a 12 V transformer?

I was thinking about using an old fridge as a seedling cabinet. I am tempted to use the resistor of an out of order pizza oven plugged on a small 12 V transformer to heat the cabinet. I didn't do the ...
Skippy le Grand Gourou's user avatar
0 votes
0 answers
46 views

How to add more lights and sirens to motion detector

I have a motion detector size of a cigarette box that rings bell or simple song when activated using a small remote control. We turn it on after closing the business to go home. We've had many ...
McJoo's user avatar
  • 1
0 votes
1 answer
86 views

Breaker with alarm

I am thinking about a theft alarm for an HVAC condenser. The condenser is installed outside and subject to burglary. I think a viable approach is detecting when it is detached from power. The HVAC ...
Mehhey's user avatar
  • 1
0 votes
0 answers
41 views

LS7220 IC question for HIGH and LOW

I am learning about the basics of electronics. I bought an LS7220 chip for a keypad lock, but using it turned out more difficult than I expected. I have attached it to a 9v battery at pins 9 and 14, ...
questioner's user avatar
0 votes
0 answers
80 views

Why does Intel's CCA (USB3 JTAG control scheme) not let a remote attacker own any system with a flash drive plugged in?

JTAG lets us read / write the architecture states on a CPU core. Intel's CCA let's us connect to JTAG with a USB3 port. So why could an attacker not execute code to trick a flash drive plugged into a ...
J.Todd's user avatar
  • 223
0 votes
0 answers
71 views

Detection range of unintentional emissions by battery powered video recording devices?

I have read about unintentional radiators, but wonder about what their unwanted emissions detection range can be in low background noise, referring to battery powered motion-sensor activated video ...
yifos's user avatar
  • 11
0 votes
0 answers
52 views

Problem with understanding the circuit related to stable matching security

I am trying to understand a circuit used for stable matching. The paper title is: MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation and is available : here I am attaching the ...
user2994783's user avatar

15 30 50 per page