Smartcard Microcontroller Copy Protection is one of the most difficult parts for the whole process. The modern smartcard Microcontroller Copy can provide various anti-IC copy methods, its internal voltage sensor can protect the power supply noise copy also known as power glitch mcu cracking from over-voltage or insufficient voltage. Clock frequency sensor can help to prevent the static analysis and low down the chance of Microcontroller Copy for the low clock frequency.
Random calculation counter on the smartcard IC makes the MCU embeded firmware extraction through the security code become difficult. Top layer metal layer network and internal databus hardware encryption makes the microprobe IC copy full of doubts and questions. Photo sensible detector can prevent the de-capsulation on the smartcard IC in view of functionality. Besides, assess to the interal memorizer will need a password.
Microcontroller Copy from the smartcard, especially for the new design, it is process which require great amount of time and money. Only the laboratory with high advanced facilities plus veteran engineers can probably success. Those electronic components and module with anti-tamper functions can provide better protection against the Microcontroller Copy. Such as the iBUTTON from DALAS . it will place the IC upon side of metal, use as the sensor for battery and tampering. Once the tampering action has been detected in the process of Microcontroller Copy, the internal memorizer will be wiped out, and prevent the sensible datas to be extracted by the Microcontroller Copy.
Another example is from the security block on the bank ATM machine, such as IBM4758, it has a better anti-tampering ability, it has radiation and low temperature sensor which can provide multiple ways to prevent the Microcontroller extraction. These products are much more expensive than the smartcard, but it can at the same time provide better protection. However, Microcontroller Copy can get its security code through taking advantage of its software flaw.