Похожие чаты

Wow, overlooked your answer. Yeah, now I see the whole picture

and understand why you asked the original question. Indeed, it makes sense to dump flash and compare hash.
Really interesting subject. It's worth to mention that lots of devices manufactured are hackable, check out "defcon" conference videos, how they hack various devices. And I bet that developers don't bother too much with securing device with a stonewall protection just because of comparing expenses of possible harm with expenses for develpment. What happens if your device is hacked? What would be the damage? I guess, that not too much to consider for most cases. It's also makes sense to prevent reading of your code as it may contain data or logic that forms a commercial secret and it's leak can cause significant loss. Not only exploiting.

Here are some of my thoughts regarding your question:
1. If not to stick to hardware to make it secure, I would think about trying to store part of the important/private state of MCU firmware on a server, where it can get it when needed. Can't figure out how exactly to secure your code or detect malicious firmware flashed on the MCU. This is just idea, should be elaborated. Also I would look into irreversible functions and particularly into asymmetric encryption. They have the effect that you need - somebody can read your data (decrypt with public key) but he can't change it without private key.
2. If you are on a design stage and haven't yet confirmed the hardware, I would research about protection features that MCUs provide. They vary greatly: some have almost no protection features, and some have lots of them from lock bits to encryption. If the security is of utmost importance in your project then it may be the first criteria of the hardware to choose.
3. The method you described: before update or any important operation you dum flash and compare hash. It sounds OK and makes sense, but in such case you need to concentrate on protecting your andriod application. It's not too hard to hack it and skip this check in bytecode - if it's a simple "if/if-else" clause.

So it's all depends on what kind of attack you're trying to protect from.

1 ответов

18 просмотров

Thank you very much for this response it sheds some light

Похожие вопросы

Обсуждают сегодня

а через ESC-код ?
Alexey Kulakov
29
30500 за редактор? )
Владимир
47
Чёт не понял, я ж правильной функцией воспользовался чтобы вывести отладочную информацию? но что-то она не ловится
notme
18
У меня есть функция где происходит это: write_bit(buffer, 1); write_bit(buffer, 0); write_bit(buffer, 1); write_bit(buffer, 1); write_bit(buffer, 1); w...
~
13
any reference of this implementation?
BitBuddha
29
Ⓐrtto, [4/23/24 7:02 PM] Please explain more fully how it is not working exactly, and what are the steps you are taking, and what error messages come or what happens. Ⓐrtto, ...
Ezza Kezza
2
sounds like people have lost their kaspa on tradeogre... does this mean tradeogre not trustworthy?
Ezza Kezza
15
Страшнейшая правда про списки ЦБ. С первых дней жизни P2P сферы, молодые человеки, начитавшись законодательной базы и "внутренних" документов, решили, что им противостоит сер...
Foxcool
3
Недавно Google Project Zero нашёл багу в SQLite с помощью LLM, о чём достаточно было шумно в определённых интернетах, которые сопровождались рассказами, что скоро всех "ибешни...
Alex Sherbakov
5
So much speculation in the last week. So much volatility in price. This is because Hedera has a GC that isn't using the network it's governing. Why aren't people asking why a...
Summit Seeker R
9
Карта сайта