Altera_Forum
Honored Contributor
14 years agoSecurity vulnerability with MAX CPLD's !!
I'm currently using an EPM3256 CPLD in a prototype to prove a design and was thinking of using the same CPLD in the final revision until a colleague alerted me to possible security vulnerabilities with these devices as well as many other vendor parts.
Scratching around the internet I found a dude that has done a thesis on the subject and another mob that will actually circumvent the security on these devices and read back the design information so it can be copied by unscrupulous operators !! http://www.mcu-reverse.com/altera/epm3256a (http://www.mcu-reverse.com/altera/epm3256a) http://www.cl.cam.ac.uk/~sps32/mcu_lock.html (http://www.cl.cam.ac.uk/~sps32/mcu_lock.html) Until now I was always under the impression that once the security bit was set the security of these devices was bullet proof. I don't feel happy expending lots of development time only to know that the investment in time and money could easily be given away to some unscrupulous third party :( The question to Altera is have they improved the situation in later devices and what have they done to make this type of invasive chip probing impossible or impractical ?? regards