Extract MCU Protection can remove the silkscreen marks printed on the surface of microcontroller;
crack MCU embedded firmware need to know the part number, this is a most important information a MCU extracter should obtain in the first place. Without it, the MCU attacking process can’t be proceed immediately.
Print no marking on the MCU surface, print fake marking or re-print the new marking on the MCU surface can help to prevent microprocessor program cloning. In order to prevent the low level MCU breaking, and MCU manufacturers will usually wipe out the marking on the surface of MCU, but it can’t fend off the stuborn MCU attacker. Generally speaking, this method can effectively increase the MCU reverse engineering expenditure.
Through two methods can help to find MCU’s part number, one of them is monitor it under the microscopy after decapsulate the MCU outer package, since most of the MCU will have manufacturer name and MCU marking leave inside it. The other method will spend much less cost, microcontroller cracker can check their signal line, such as power supply, ground, clock or reset line. Since each one of MCU will have the unique pinout order of their own, which can help to ensure their general type.
In order to better prevent the MCU memory hacking and have better protection, MCU designer can wipe out the marking, or turn the MCU upside down, and treat the backside as top side. Or designer can cut off the leads on one side.
If designer need to better protect the MCU, MCU can use un-standard footprint and package, such as COB (Chip On Board), they can even print the marking on the MCU by themselves. But this method is only suitable for the mass production of electronic product, some MCU manufacturers can provide this kind of service, some MCU manufacturers can also pre-programme the MCU and print the customized marking on them.