Spear and shield matchup: If I am a chip "counterfeiting king"

If I am going to be a "pirate" who specializes in chip forgery, I will of course use every weakness of the anti-counterfeiting technology and will make my illegal products flow into the supply chain as much as possible. .

Before exploring the idea of ​​the chip "Counterfeit King", let's discuss some useful and less useful anti-counterfeiting strategies. I have discussed DNA science and plant DNA as a new anti-counterfeiting technique in a previous article. The key to achieving optimal security is to have processes and materials that cannot be replicated, thus preventing counterfeiters from mimicking tokens or tokens themselves.

I also wrote about the use of RFID tags for pseudo-identification, and found that an RFID tag can be produced for about 10 euros. Therefore, the best anti-counterfeiting technology must be unrepeatable and affordable, so even small businesses can protect their products from the use of illegal components and materials.

Now, counterfeiters are beginning to realize this. So let us glimpse into the heart of the chip "Counterfeiting King".

Seriously, if I am a chip "counterfeiting king", RFID can't scare me! Because I only need to let my counterfeit label enter the supply chain before the real product enters the supply chain. As long as my counterfeit label is scanned first, then the original label will be scanned at the same location. In order for the counterfeit tag to pass through all the scanning sites to smoothly enter the access system, it must be pre-emptive before the first scan of the true tag.

However, this is not a big problem. As long as the first batch of counterfeit goods can be shipped by air, the rest can go by sea. Or, I just need to get an original RFID tag from the container and put it in my own container full of counterfeit goods. It is good to let the shipper think that the container carries the legal goods as much as possible. Really, RFID is really not a problem under my comprehensive network deployment. I just need to make sure that the people who log in for me can happily get a lot of money after they finish.

But how do I deal with the problem of plant DNA molecular markers? It's not as simple as planting some plants in the backyard at home and then using DNA inks like making your own. I must first assume that the customs use some kind of ultra-safe NDA mark, but I also know that it takes time and cost to verify a set of genes. So if I want to challenge DNA high tech, I'd better try to speed things up and get ahead of the big DNA deployment schedule. The future of this technology will really become ubiquitous, and it will continue to grow and develop because of the continued reduction in costs.

Just a short year ago, DNA sorting operations took weeks or months of lab-intensive forensics and cost thousands of dollars. Today, the same work can be done in a one-hour desktop sorter, and the cost has dropped to around $1,000.

I know that DNA tags are still in the early stages of testing and verification, so I don't have to worry too much about it now, but I'd better start investing in this reverse engineering with millions of dollars I've earned from counterfeit components. Research and development. I have to find out as quickly as possible the key formulas and components that make this technology a military-grade secret.

In addition, there is another technology that I really don't know how to crack as a counterfeit king. My own lab technology has been able to replicate almost every key of all non-volatile memory components like EEPROM and Falsh - it's actually quite simple, as long as the power is turned off and the chip is removed from the board. The data is still there, and even the expensive forensics technology is free, so you can easily read these keys. In fact, everything I do is just a standard operating procedure for the general failure analysis process. For those encryption mechanisms that use an off-board key, I only need to process the bus board and read the data stream bits.

However, a new anti-counterfeiting technology that incorporates "Physically Unclonable Functions" (PUF) interrupted my plan. This new type of hardware security is based on the characteristics of sub-micron component materials. Its key is only present when the component is powered up, and each chip has its own unique key. Even if I can get one of these keys, it can't be used on other chips, and it can also cause damage during my cracking process. Each chip key is different, and its mark is also native to the chip, so if the component is powered off, the mark will disappear. This technology will definitely have a major impact on my business!

Therefore, I must be familiar with more about this technology as soon as possible, otherwise my semiconductor component business will be finished.

Now, I know that microprocessors, microcontrollers, specific oscillators, and FPGAs are all ready for this technology. Today is just a matter of time. In addition to adding keys, they will soon build Dedicated encryption arrays are used in small components that do not require memory.

According to the latest newsletter, Douglas Alexander, the chief consultant of Component Engineering Consultants, is about to write a follow-up report on this technology. We must pay close attention to this person and its articles. Maybe we can also send him a pair of shoes filled with cement, and then quietly take him to the East River (about the East River). How do you see this idea?

Orthopedic Surgical Pack

Sterile Surgical Orthopaedic Pack,Disposable Surgical Orthopaedic Pack,Surgical Orthopaedic Pack,Surgical Packs For Orthopaedic

Suzhou JaneE Medical Technology Co., Ltd. , https://www.janeemedical.com

Posted on