{"id":425,"date":"2022-01-05T03:16:34","date_gmt":"2022-01-05T03:16:34","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=technology&p=425"},"modified":"2022-10-11T07:13:15","modified_gmt":"2022-10-11T07:13:15","slug":"anti-tamper","status":"publish","type":"technology","link":"https:\/\/www.pufsecurity.com\/zh-hant\/technology\/anti-tamper\/","title":{"rendered":"Anti-tamper Design"},"content":{"rendered":"\n
Anti-tampering design denotes all the techniques to prevent, detect, or respond to physical attacks on a chip. It is a crucial Anti-tamper design denotes all the techniques to prevent, detect, or respond to malicious attacks on a chip. It is a crucial aspect of chip security that is implemented in physical layout, digital RTL, or a combination of both. Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry. Therefore, anti-tampering design is critical to protect sensitive information from the three main types of tampering attacks: invasive, semi-invasive, and non-invasive.<\/p>\n\n\n\n
Invasive Attacks begin with the destruction of the chip packaging and removal of the passivation layer. Hackers can then take the physical circuitry designs and security know-how by physical inspection. Alternatively, they can apply signals to the exposed chip to make it behave incorrectly or affect normal operations.<\/p>\n\n\n\n
Semi-invasive Attacks relate to inducing electrical failures within a chip and further monitoring the effects.<\/p>\n\n\n\n
Non-invasive are passive attacks where hackers monitor the normal operation of a chip without modifying or directly affecting anything.<\/p>\n\n\n\n
Accordingly, anti-tampering design covers all the methodologies to fight against these various types of tampering attacks.<\/p>\n\n\n\n
Anti-tamper designs typically form a shell to counter various types of attack, such as scrambling the data when it is being written or detecting a glitch in the circuitry.<\/p>\n","protected":false},"author":3,"featured_media":3094,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"subjects":[226],"tech-tag":[231],"class_list":["post-425","technology","type-technology","status-publish","has-post-thumbnail","hentry","subjects-physical-macros","tech-tag-foundational-technology"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/425"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/technology"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=425"}],"version-history":[{"count":10,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/425\/revisions"}],"predecessor-version":[{"id":4524,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/technology\/425\/revisions\/4524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/3094"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=425"}],"wp:term":[{"taxonomy":"subjects","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/subjects?post=425"},{"taxonomy":"tech-tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/tech-tag?post=425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}