Yahoo Groups archive

AVR-Chat

Index last updated: 2026-04-28 22:41 UTC

Thread

Chip Security

Chip Security

2010-08-31 by Dean Claxton

Hi everyone,

just wondering how secure these AVR's are - how much effort is involved to
read the flash and eeprom off a chip with security fuses enabled and jtag
disabled?


[Non-text portions of this message have been removed]

Re: Chip Security

2010-08-31 by Eugene

Hello.
The methods are simple: just open the crystal, find the fuses block and restore some of them i think. :)

--- In AVR-Chat@yahoogroups.com, Dean Claxton <deanclaxton@...> wrote:
Show quoted textHide quoted text
>
> Hi everyone,
> 
> just wondering how secure these AVR's are - how much effort is involved to
> read the flash and eeprom off a chip with security fuses enabled and jtag
> disabled?
> 
> 
> [Non-text portions of this message have been removed]
>

Re: [AVR-Chat] Chip Security

2010-08-31 by Jim Wagner

On Aug 30, 2010, at 5:50 PM, Dean Claxton wrote:

> Hi everyone,
>
> just wondering how secure these AVR's are - how much effort is  
> involved to
> read the flash and eeprom off a chip with security fuses enabled and  
> jtag
> disabled?
>
> [Non-text portions of this message have been removed]
>
>
> 
The buzz over the last year or two on the Freaks web site is that you  
can get any AVR broken for about $500 in Eastern Europe.

Its my understanding that this is pretty much true of any micro in  
which the executable code is not encrypted in ROM.

Jim

[Non-text portions of this message have been removed]

Re: [AVR-Chat] Chip Security

2010-08-31 by STEVEN HOLDER

Exactly as Jim says, if you really want it secure do a bootloader with DES/AES security built in, and encrypt with the create application from avr, this create an enc file which can be bootloaded in with update, do all the security fuses as well and it is pretty dam hard to crack that.
 
In essence the code will be as secure as the effort that you put in to it.
 
Regards


--- On Tue, 31/8/10, Jim Wagner <wagnerj@proaxis.com> wrote:
Show quoted textHide quoted text
From: Jim Wagner <wagnerj@proaxis.com>
Subject: Re: [AVR-Chat] Chip Security
To: AVR-Chat@yahoogroups.com
Date: Tuesday, 31 August, 2010, 3:30



On Aug 30, 2010, at 5:50 PM, Dean Claxton wrote:

> Hi everyone,
>
> just wondering how secure these AVR's are - how much effort is  
> involved to
> read the flash and eeprom off a chip with security fuses enabled and  
> jtag
> disabled?
>
> [Non-text portions of this message have been removed]
>
>
> 
The buzz over the last year or two on the Freaks web site is that you  
can get any AVR broken for about $500 in Eastern Europe.

Its my understanding that this is pretty much true of any micro in  
which the executable code is not encrypted in ROM.

Jim

[Non-text portions of this message have been removed]



------------------------------------

Yahoo! Groups Links





[Non-text portions of this message have been removed]

Move to quarantaine

This moves the raw source file on disk only. The archive index is not changed automatically, so you still need to run a manual refresh afterward.