Microprocessor Secured Memory Attacking technology usually uses the processor communication interface and uses protocols, encryption algorithms, or security vulnerabilities in these algorithms to attack.
For example, a typical case is an attack on the early XXX series single-chip computers. The attacker took advantage of the loopholes in the design of the erasing operation timing of this series of single-chip microcomputers. After cracking the encryption lock bit, the attacker stopped the next step of erasing the on-chip program memory data by using a self-programmed program, so that the encrypted single-chip microcomputer became Unencrypted single-chip microcomputer, and then use the programmer to read the on-chip program.
At present, on the basis of other encryption methods, some equipment can be developed to cooperate with certain software to perform MCU software decryption. For example, use some programmers to locate the inserted bytes, and find out whether there are continuous vacancies in the chip through a certain method, that is, to find the continuous FF FF bytes in the chip, the inserted bytes can be executed to send the program on the chip.
The instructions outside the chip are then intercepted with decryption equipment, so that the program inside the chip is decrypted.