IC Reverse Engineering.docx by Elsa Cristina David on Scribd
Saturday, August 26, 2017
Good morning...welcome back to war! "That depends on the TPM's level of resistance against physical attacks, which I think varies between manufacturers. The protection isn't in the circuit itself but in the wrapping around it. Some of them are essentially bolted-on smartcards with a chip that's inside a protective layer which dissolves the chip in acid if exposed to air. Some of them are just ordinary chips. The biggest weak point in a TPM is the bus between it and the processor — attacks on that bus break a lot of TPM uses, but doesn't help if what you want is the EK. "
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment