-
公开(公告)号:US20240431021A1
公开(公告)日:2024-12-26
申请号:US18340985
申请日:2023-06-26
Applicant: NXP B.V.
Inventor: Lutz Pape , Nikita Veshchikov , Tobias Richard Erich Nink
Abstract: A method is provided for detecting tampering of a printed circuit board (PCB) using a tamper detection circuit implemented in an integrated circuit (IC) mounted on the PCB. In the method, a reference signal is generated and provided to a terminal of the IC. The terminal is connected to another circuit mounted on the PCB. A first response signal is received in response to the reference signal at the terminal. One or more characteristics of the first response signal are stored in a memory. The reference signal is again provided to the terminal of the integrated circuit and a second response signal is received at the terminal. The stored characteristics of the first response signal are compared to corresponding characteristics of the second response signal to generate a comparison result. The comparison result is used to detect tampering. When tampering is detected, an indication is provided.
-
公开(公告)号:US20240020383A1
公开(公告)日:2024-01-18
申请号:US17812244
申请日:2022-07-13
Applicant: NXP B.V.
Inventor: Jack Connor , Nikita Veshchikov , Lutz Pape
IPC: G06F21/55
CPC classification number: G06F21/556 , G06F2221/031
Abstract: A method is provided for protecting an electronic device from a side-channel attack (SCA). The method includes providing a plurality of countermeasures that are for protecting the electronic device from the SCA. A set of countermeasures of the plurality of countermeasures is randomly enabled from the plurality of countermeasures to provide the protection during operation of the electronic device, such as for example, during an encryption operation. The method makes it more difficult for an attacker to construct a template of the electronic device that could be used in the SCA. In another embodiment, an electronic device is provided that incorporates the method.
-
公开(公告)号:US20230394139A1
公开(公告)日:2023-12-07
申请号:US17805568
申请日:2022-06-06
Applicant: NXP B.V.
Inventor: Nikita Veshchikov , Lutz Pape , Jack Connor
IPC: G06F21/55
CPC classification number: G06F21/554 , G06F2221/031
Abstract: A method is provided for defending against a fuzzing analysis in a device. The method including: receiving, by the first device, a message from a second device; determining the message type of the message; determining that the message type is different from known message types of a protocol used by the first device; determining that the fuzzing analysis of the protocol is underway; and using the message type of the message to randomly determine an action against the fuzzing analysis. The action is intended to cause an attacker who tries to use fuzzing against a device to spend much more effort to discover a bug that can be exploited, and thus discourage the attacker from continuing the attack.
-
-