Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
Richard Erlacher
06/01/12 09:47
Read: 483 times
Denver, Co

#187598 - as far as IP theft is concerned ...
Responding to: Maarten Brock's previous message
deciphering the content of an FPGA, even knowing the application circuit and functional specifics can be a real headache, and there's seldom any guarantee that you've gotten it right. Further, the primary reason one would want to steal the IP is to replicate the product in question.

All the time spent on "cracking" someone else's work could be much better spent on observing its behavior and producing a better product instead. That's certainly what the original developers are doing, and they've got a head start.

What most frightens people in the know, in the current environment, is that if a determined adversary, terrorist group, or other attacker finds such a device in place within the power, communication, or transportation infrastructure and figures out how to access it remotely (quite unlikely), he'd be well placed to wreak havoc on the systems in which he found the device.

I don't know how others use programmable logic, but I've never put programmable logic in a circuit in such a way that it could be directly accessed from a remote location. I don't even know whether that's possible.


List of 17 messages in thread
have you seen this?      Richard Erlacher      05/30/12 22:31      
   Backdoor access      Oliver Sedlacek      05/31/12 05:15      
      What's the big deal?      Richard Erlacher      05/31/12 06:35      
      Crypto keys      Per Westermark      05/31/12 06:42      
         High security chips      Oliver Sedlacek      05/31/12 07:28      
            IP theft      Maarten Brock      06/01/12 07:20      
               as far as IP theft is concerned ...      Richard Erlacher      06/01/12 09:47      
   Its really      Jez Smith      06/01/12 09:22      
      Biggest problems is still processor copy-protection      Per Westermark      06/01/12 09:43      
         so Mr Evil Hacker gets his keys      Jez Smith      06/01/12 16:25      
            Mr Evil Hacker is most definitely busy      Per Westermark      06/02/12 10:33      
   Who writes that crap?      Andy Peters      06/04/12 10:32      
      Don't think so much about modification as in extraction      Per Westermark      06/04/12 13:54      
      The people who write that crap...      Jez Smith      06/04/12 15:08      
         c'mon, Jez!      Andy Peters      06/06/12 15:12      
      Never mind who writes it ....      Andy Neil      06/05/12 05:27      
         Right on!      Richard Erlacher      06/05/12 09:46      

Back to Subject List