Design Tip: Make Your Devices Clone-Resistant

March 1, 2007
If you suspect your device may be vulnerable to cloning, it probably is! Often-cloned products include consumables like battery packs, digital-content playback devices, and electronic product peripherals. Designers must understand the types of attac

If you suspect your device may be vulnerable to cloning, it probably is! Often-cloned products include consumables like battery packs, digital-content playback devices, and electronic product peripherals.

Designers must understand the types of attacks their product is likely to face. Some attacks duplicate the design entirely, which happened in 2006 with a well known cell-phone platform. More common attacks involve the reverse engineering of interface protocols. Still others extract unlock codes or re-enlist a depleted consumable.

A common defense is to use obfuscated source code. Use caution, though, as it can hinder debugging and code verification and helps little when attackers directly copy binaries or use debugging environments.

A better set of anti-cloning tools includes protected device keys, microprocessors with hardware support for cryptography, and robust authentication protocols. Many traditionally constrained computing environments now contain enough processing power to enable standard, well-reviewed cryptographic protocols. When possible, devices should have individual keys that can be managed and revoked.

Look for memory protection, on-chip ROM, JTAG disablement, and security fuses. Implementations should be resistant to side channel attacks like timing attacks and differential power analysis. High-security applications should disable ASIC scan and other silicon debug features. And, protect verification processes. Some game consoles can be "chipped" to bypass copy protection mechanisms.

Seek experienced security reviews, as a single implementation problem can render a security system useless. Also, take care in key issuance, storage, and revocation, as these design choices affect SKU management costs and may hinder recovery from in-field attacks.

Sponsored Recommendations

Near- and Far-Field Measurements

April 16, 2024
In this comprehensive application note, we delve into the methods of measuring the transmission (or reception) pattern, a key determinant of antenna gain, using a vector network...

DigiKey Factory Tomorrow Season 3: Sustainable Manufacturing

April 16, 2024
Industry 4.0 is helping manufacturers develop and integrate technologies such as AI, edge computing and connectivity for the factories of tomorrow. Learn more at DigiKey today...

Connectivity – The Backbone of Sustainable Automation

April 16, 2024
Advanced interfaces for signals, data, and electrical power are essential. They help save resources and costs when networking production equipment.

Empowered by Cutting-Edge Automation Technology: The Sustainable Journey

April 16, 2024
Advanced automation is key to efficient production and is a powerful tool for optimizing infrastructure and processes in terms of sustainability.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!