Attacking a secure smartcard

Jerry Leichter leichter at lrw.com
Sat Dec 6 19:51:23 PST 2008


I've previously mentioned Flylogic as a company that does cool attacks  
on chip-level hardware protection.  In http://www.flylogic.net/blog/?p=18 
, they talk about attacking the ST16601 Smartcard - described by the  
vendor as offering "Very high security features including EEPROM flash  
erase (bulk-erase)".  The chip is covered by a metal mesh that, if cut  
or shorted, blocks operation.  However, Flylogic reports:

"Using our techniques we call, bmagicb (okay, itbs not magic but 
webre  not telling), we opened the bus and probed it keeping the chip 
alive.   We didnbt use any kind of expensive SEM or FIB.  The equipment 
used  was available back in the 90bs to the average hacker!  We didnbt 
even  need a university lab.  Everything we used was commonly available for  
under $100.00 USD.
This is pretty scary when you think that they are certifying these  
devices under all kinds of certifications around the world."

                                                        -- Jerry




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list