Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
Jez Smith
06/01/12 16:25
Read: 472 times
Birmingham
England


 
#187602 - so Mr Evil Hacker gets his keys
Responding to: Per Westermark's previous message
What's he going to do ?

reverse engineering the configuration bit stream of an FPGA, I couldn't even guess how long that might take, then you are presented with a schematic with a couple of million logic gates and the game is determine what it does.

O.K so several years later you can read the logic and work out what it does, now you can implant your evil logic bomb in the code, only slight problem is it only works on the one on your desk, hmmmm you could hack into the SVN server of the producer and replace their production code with your evil code, they might not notice.

As an evil plan goes its not very good. this is why the whole premise is flawed, people only use encrypted configuration bit streams to prevent their I.P from being stolen.

The second problem is the sort of product where they really really don't want Mr Evil Hacker to look at the code, are not for sale commercially and are only available to governments and their agencies.

This is why I think this company is a typical dodgy Cambridge university spin off, they don't even have a phone number.

List of 17 messages in thread
TopicAuthorDate
have you seen this?      Richard Erlacher      05/30/12 22:31      
   Backdoor access      Oliver Sedlacek      05/31/12 05:15      
      What's the big deal?      Richard Erlacher      05/31/12 06:35      
      Crypto keys      Per Westermark      05/31/12 06:42      
         High security chips      Oliver Sedlacek      05/31/12 07:28      
            IP theft      Maarten Brock      06/01/12 07:20      
               as far as IP theft is concerned ...      Richard Erlacher      06/01/12 09:47      
   Its really      Jez Smith      06/01/12 09:22      
      Biggest problems is still processor copy-protection      Per Westermark      06/01/12 09:43      
         so Mr Evil Hacker gets his keys      Jez Smith      06/01/12 16:25      
            Mr Evil Hacker is most definitely busy      Per Westermark      06/02/12 10:33      
   Who writes that crap?      Andy Peters      06/04/12 10:32      
      Don't think so much about modification as in extraction      Per Westermark      06/04/12 13:54      
      The people who write that crap...      Jez Smith      06/04/12 15:08      
         c'mon, Jez!      Andy Peters      06/06/12 15:12      
      Never mind who writes it ....      Andy Neil      06/05/12 05:27      
         Right on!      Richard Erlacher      06/05/12 09:46      

Back to Subject List