Questions tagged [security]

107 questions
49
votes
4 answers

Why do fire and security systems run at 27.6 V?

I have been looking at buying power supply units for a project, and I keep seeing supplies that output 27.6 V. It's an unusually specific number, so what they are used for, and why is it important that they produce 27.6 V? It appears that these are…
Lucas
  • 609
  • 5
  • 5
25
votes
5 answers

Why are SRAM based FPGA used more than NVM based FPGA?

SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that. I wonder, why are more experiments and security research done on the SRAM FPGA than the the NVM based one, it seems that the…
Lavender
  • 527
  • 1
  • 5
  • 10
14
votes
5 answers

Is it possible to jam wireless home alarm systems?

Sorry if this is the wrong community for this question but in my mind, it's the best fit. Please close or move to a more appropriate community if it's off topic. The other day, several home alarm companies came to look at my home to quote an alarm…
Classified
  • 296
  • 3
  • 10
11
votes
8 answers

What is the ideal method of sensing whether 4 points on the bottom of a device are all depressed to indicate contact?

I am trying to place a sensor or switch on each corner of some desktop PCs so that if they are lifted an event is triggered like locking the computer or encrypting it. So far I have considered small round load sensors mounted with adhesive between…
11
votes
5 answers

Would an electric fence be able to detect being bypassed?

In the Flashpoint episode "The Farm," there's a scene where you can see one of the officers run a jumper cable from one contact on an electric fence to another, then cut the line of the fence (not breaking the circuit, mind you). Based on context…
Der Kommissar
  • 273
  • 1
  • 13
10
votes
6 answers

A few questions on PIRs and other motion detectors

I grew up incorrectly believing that motion detectors (as part of burglar alarm systems) were designed to detect movement, when in actual fact it is the movement of a heated (like body heat) object which causes them to trip. I also understand there…
questioner
  • 253
  • 2
  • 11
7
votes
3 answers

securely storing and using keys in an embedded system

I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command. The encrypted commands are stored offline, so I cannot just change the key whenever I want. The key is…
Sonja
  • 77
  • 1
  • 4
7
votes
2 answers

Is there a way to prevent code being read from an MSP430 without blowing the fuse?

I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing the JTAG fuses for the first few beta releases, but…
Dom
  • 349
  • 5
  • 19
6
votes
1 answer

Examples of DRM on embedded systems

I'm tasked with implementing a DRM on an embedded system. The device would have a limited number of times which it can run, after which it would be disabled, until it syncs with a computer with an internet to be allowed to run again. For…
alexbb
  • 309
  • 4
  • 6
6
votes
4 answers

How safe is this and should I change it?

I just finished building a project in my house to automate two plugs I installed on the top of my table, but due to laziness I left the ground connections outside the junction box like in the image: For the purpose of the image I left the junction…
DeadSec
  • 377
  • 1
  • 3
  • 12
5
votes
0 answers

How to save electronic equipment from ants?

Today I brought out my external HDD and it was full of red ants. It took me an hour to remove the ants (it seems quite impossible to remove all of them; some are still inside). I always see some ants are coming out of my laptop. My sister's laptop…
sakibmoon
  • 255
  • 1
  • 3
  • 5
5
votes
1 answer

Is it possible to read erased flash memory?

In hard disks, a "quick format" does nothing to the actual data on the disk - just clears the FAT (file allocation table), which then appears as a "blank disk" to the user. Therefore, it is fairly easy to ignore the FAT and read that data. Although…
rdtsc
  • 15,913
  • 4
  • 30
  • 67
5
votes
3 answers

Large exponentials and 8-bit PIC processors

Does anyone know if 8-bit (PIC) processors could typically handle large exponentials, e.g., 5^15 mod 23, with a reasonable speed? Does doing so result in more cycles than on 16-bit processors? I'm hoping to implement Diffie-Hellman Key Exchange on…
Kar
  • 1,517
  • 1
  • 15
  • 35
4
votes
1 answer

How can I embed SmartCard/certificate challenge functionality in an embedded project?

I want to enable secure communication by embedding a certificate chip for a PKI in my embedded system so I can sign outgoing messages and make certificate challenges. I was expecting that there exist particular chips that have these certificates…
3
votes
2 answers

How to add security to your Product

I've been trying to build up certain Embedded systems and i wonder how people make them secure. Or else it would have been reproduced well. I know there is an extent to provide security if you are using Controllers like PIC/AVR and well known chips…
Rookie91
  • 2,108
  • 4
  • 29
  • 46
1
2 3 4 5 6 7 8