Attack MCU Method can be categorized with invasive and semi-invasive ones, through which will be able to extract code from IC chip and make microcontroller clone;
1 — Software MCU Attack:
This method use communication interface of processor plus protocol, encrypted algorithm to attack microcontroller, a typical successful example of software attack is the breaking against early MCU ATMEL AT89C51 series MCU. Attacker takes advantage of the design flaw of erasure operation sequence, use self-made program to erase encrypted lock location, and then halt the next operation of erase internal program, through which the encrypted MCU being turn into decrypted MCU after attacked, finally use programmer to read the internal procedure.
Currently base upon the other encryption method, some kind of devices can be promoted accompany with certain types of software can be used as software mcu attack. In recent days, domestic market has presented a kind of 51 MCU cracking device, this decipher is mainly focus on brands like SyncMos, Winbond, use the leak of the production technology and insert positioning bit of several programmer, find out continuous empty locations through certain methods, which means need to find out the continuous FF FF bits, those inserted bits can instruct the order of send internal program to outside environment, and then use processor attack device to intercept and capture.