Design Tip: Make Your Devices Clone-Resistant

March 1, 2007
If you suspect your device may be vulnerable to cloning, it probably is! Often-cloned products include consumables like battery packs, digital-content playback devices, and electronic product peripherals. Designers must understand the types of attac

If you suspect your device may be vulnerable to cloning, it probably is! Often-cloned products include consumables like battery packs, digital-content playback devices, and electronic product peripherals.

Designers must understand the types of attacks their product is likely to face. Some attacks duplicate the design entirely, which happened in 2006 with a well known cell-phone platform. More common attacks involve the reverse engineering of interface protocols. Still others extract unlock codes or re-enlist a depleted consumable.

A common defense is to use obfuscated source code. Use caution, though, as it can hinder debugging and code verification and helps little when attackers directly copy binaries or use debugging environments.

A better set of anti-cloning tools includes protected device keys, microprocessors with hardware support for cryptography, and robust authentication protocols. Many traditionally constrained computing environments now contain enough processing power to enable standard, well-reviewed cryptographic protocols. When possible, devices should have individual keys that can be managed and revoked.

Look for memory protection, on-chip ROM, JTAG disablement, and security fuses. Implementations should be resistant to side channel attacks like timing attacks and differential power analysis. High-security applications should disable ASIC scan and other silicon debug features. And, protect verification processes. Some game consoles can be "chipped" to bypass copy protection mechanisms.

Seek experienced security reviews, as a single implementation problem can render a security system useless. Also, take care in key issuance, storage, and revocation, as these design choices affect SKU management costs and may hinder recovery from in-field attacks.

Sponsored Recommendations

TTI Transportation Resource Center

April 8, 2024
From sensors to vehicle electrification, from design to production, on-board and off-board a TTI Transportation Specialist will help you keep moving into the future. TTI has been...

Cornell Dubilier: Push EV Charging to Higher Productivity and Lower Recharge Times

April 8, 2024
Optimized for high efficiency power inverter/converter level 3 EV charging systems, CDE capacitors offer high capacitance values, low inductance (< 5 nH), high ripple current ...

TTI Hybrid & Electric Vehicles Line Card

April 8, 2024
Components for Infrastructure, Connectivity and On-board Systems TTI stocks the premier electrical components that hybrid and electric vehicle manufacturers and suppliers need...

Bourns: Automotive-Grade Components for the Rough Road Ahead

April 8, 2024
The electronics needed for transportation today is getting increasingly more demanding and sophisticated, requiring not only high quality components but those that interface well...

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!