Timeline for Protecting firmware .bin from reverse engineering
Current License: CC BY-SA 4.0
2 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jul 24, 2020 at 8:14 | comment | added | eckes | You can do that if your target platform has unique hardware keys, for example like iPhones did or some baseband controller blobs do. But it requires key management, additional enrollment/specialization and hardware trust anchors. And of course additional development and validation costs, not to mention the processing resources. Speaking of iPhones, Secure Enclave Firmware decryption keys have been published before. | |
| Jul 23, 2020 at 10:42 | history | answered | Marcus Müller | CC BY-SA 4.0 |