毕业论文无线电遥控系统的设计 - 图文(9)

2019-08-03 14:50

毕业设计(论文)专用纸

relays, stepper motor controller, frequency control unit, etc., to meet the communication requirements various bus driver, level converters. Electronic components in the embedded systems world, driven by embedded applications along fully meet requirements of modern electronic systems development. This makes the original classic world of increasingly small electronic systems. Practitioners in the various electronic systems to modern electronic systems as early as possible to stay.5, SCM will create a new generation of electronic elite

If the 50's, radio has created several generations of the world elite, then today's SCM will create a new generation of e-world elite. A single chip with you to the intelligent electronics If we as a dead classic electronic system electronic system, then the intelligent modern electronic systems is a \of the electronic system. Application System of hardware, electronic systems, \microcontroller applications, the application gives it \machines monitor display, it can boot the system self-test results show, not to enter the work shows a variety of stand-by state, equipment run-time display running processes, work can be displayed after the end of the current results, self results, raw data, reports and other various processing. Unattended, it can run automatically given a variety of functions. Intelligent electronic systems for the endless realm, often without additional hardware resources can achieve all kinds of renovated function. It is also present in many household appliances feature a large number of additional factors. 2 single chip computer with you to the industrial area The 21st century is the century of humanity into the computer age, many people are not used in the manufacture of computer is the computer. People using the computer, only the people engaged in embedded system applications really into the internal computer system hardware and software systems, can we truly understand the nature of the computer's intelligence and grasp the knowledge of intelligent design. MCU applications starting from the learning technology applications in today's computer software training, hardware and technical

———————————————————————————————————————

第 37 页

毕业设计(论文)专用纸

personnel of one of the best roads. 3 SCM bring you into the most attractive in the digital world Charming single chip to enable you to experience the true meaning of the computer, you can design intelligent microcontroller hands-on toys, different applications can be designed to achieve different functions. Both software design and hardware making there, both mental and physical, but also hands. Primary level can develop intelligent toys, with macro programming. Intermediate levels can develop some intelligent controller, such as computer mouse, smart cars, all kinds of remote control model. High levels can be developed robots, such as robot soccer, the development of industrial control units, network communications, and high-level language with assembly language or design application. Microcontroller and embedded systems around the formation of the future of the electronics industry, will provide a vast world of electronic fans, an even broader than the current wireless world, richer, more durable, more attractive in the digital world. Plunge into the microcontroller in the world to, will benefit your life.MCU Attacks

Currently, there are four single chip attack technique, namely: (1) software attack The technology is commonly used processor communication interface and use protocol, encryption algorithm or the algorithm of security vulnerabilities to attack. The success of software attack is a typical example of the early ATMEL AT89C MCU attacks. Attacker single chip erase operation of the timing design flaw, erase the encryption used by ourselves locked in place, the next stop on-chip program memory data erase operation, thus bringing into too close a single chip SCM not encrypted, and then use the programmer to read out chip program. (2) electronic detection of attacks The technology is usually a high time resolution to monitor the processor during normal operation of all power and interface simulation features, and by monitoring the electromagnetic radiation characteristics of it to attack. Because SCM is an active electronic device, when it executes a different command, the corresponding changes in the power consumption accordingly. This through the use of

———————————————————————————————————————

第 38 页

毕业设计(论文)专用纸

special electronic measuring instruments and mathematical statistical analysis and detection of these changes, you can access key information specific microcontroller. (3) fault generation technology Abnormal working conditions of the technology used to make the processor errors, and provide additional access to attack. Produce the most widely used means of attack, including the fault of the impact and the clock voltage shock. Low voltage and high voltage protection circuit attack can be used to prohibit the work of processor execution errors or enforcement action. Clock transition may reset the transient protection circuit will not damage the protected information. Power and clock transients transition effects in certain single-processor instruction decoding and execution. (4) probe This technology is directly exposed to chip connection, and then observe, manipulate, interfere with single chip to achieve the attack purpose. For convenience, these four people will attack techniques are divided into two categories is the intrusion type attack (physical attack), such attack requires destruction of package, then use semiconductor test equipment, microscopes and micro-positioning device, in a special laboratory spend hours or even weeks to complete. All of the micro-probe techniques are invasive type attack. The other three methods are non-invasive type attack, attack the MCU will not be physical damage. In some cases, non-invasive-type attacks are particularly dangerous, but because of non-invasive type attacks can usually be made and the necessary equipment to upgrade, so it is cheap. Most non-invasive type attack requires the attacker have a good knowledge of processors and software knowledge. In contrast, the invasive type of probe do not need too much of the initial attack of knowledge, and usually a set of similar technology available to deal with a wide range of products MCU general process of invasion-type attack

Invasive type of attack is thrown off its first chip package. There are two ways to achieve this goal: the first one is completely dissolved out chip package, exposed metal connections. The second is only removed to the top of the plastic package

———————————————————————————————————————

第 39 页

毕业设计(论文)专用纸

silicon core. The first method is the need to bind to the test fixture on the chip, using bind Taiwan to operate. The second method requires the attacker in addition to a certain degree of knowledge and necessary skills, but also the wisdom and patience, but operate relatively easy. Above the plastic chips can be opened with a knife, epoxy around the chip can be eroded by concentrated nitric acid. Hot concentrated nitric acid will dissolve out without affecting the chip, chip packaging and connection. This process usually very dry conditions, because the presence of water may erode the aluminum wire connections have been exposed. Then, in ultrasonic cleaning of the pool first chip with acetone to remove residual nitric acid, then washed with water to remove salt and dried. No ultrasound pool, are generally skip this step. This case, the chip surface, a bit dirty, but do not affect the operation of UV effects on the chip. The final step is to find the location of the protection fuse and fuse protection under exposure to UV light. General use at least a 100 times magnification microscope, from the programming voltage input pin of the connection tracking in, to find protection fuse. If there is no microscope, the use of different parts of the chip is exposed to ultraviolet light and observe the results under the simple search mode. Operation applied opaque paper cover to protect the program memory chips are not erased by ultraviolet light. Will protect the fuse exposed under UV light 5 to 10 minutes to destroy the protection bit of the protective effect, use a simple programmer can directly read the contents of program memory. The use of the protective layer to protect the MCU EEPROM cell, using ultraviolet light reset protection circuit is not feasible. For this type of MCU, the general use of micro-probe technology to read the memory contents. In the chip package is opened, the chip placed under the microscope can easily find from the memory circuit connected to other parts of the data bus. For some reason, the chip lock-bit programming mode is not locked in the memory of the visit. Advantage of this flaw on the data lines to probe the above data can be read all you want. In programming mode, restart the process of reading and connect probe to

———————————————————————————————————————

第 40 页

毕业设计(论文)专用纸

the other data can be read online program and data memory, all of the information. There is also a possible means of attack is the use of microscopy and laser cutting machines and other equipment to find the fuse protection to this part of the circuit tracing and linking all the signal lines. Because of the design defects, so long as cut off from other circuit protection fuse to a one signal line, you can ban the entire protection. For some reason, this thread is very far from the other line, so the use of laser cutting machine can cut the wire without affecting the adjacent line. In this way, using a simple programmer can directly read the contents of program memory. Although the most common single chip microcontroller has fuse blown inside the code protection features, but because of general low-end MCU is not positioning the production of safe products, so they often do not provide targeted preventive measures and the low level of security. MCU applications with a broad, large sales volume, commission processing and transfer of technology between firms frequently spilled a lot of technical data, making use of loopholes in the design of such chips and test interface manufacturer, and by modifying the invasive type fuse protection bits, etc. means of attack or invasion-type attack to read MCU's internal procedures have become easier. about common single chip.

STC microcontroller STC's mainly based on the 8051 microcontroller core is a new generation of enhanced MCU, the instruction code is fully compatible with the traditional 8051, 8 to 12 times faster, with ADC, 4 Road, PWM, dual serial ports, a global unique ID, encryption of good, strong anti-interference. PIC Microcontroller: MICROCHIP's products is its prominent feature is a small, low power consumption, reduced instruction set, interference, reliability, strong analog interface, the code of confidentiality is good, most of the chip has its compatibleFLASH program memory chips. EMC SCM: Elan's products in Taiwan, with much of the PIC 8-bit microcontroller compatible, and compatible products, resources, compared to the PIC's more, cheap, there are many series of options, but less interference. ATMEL

———————————————————————————————————————

第 41 页


毕业论文无线电遥控系统的设计 - 图文(9).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:高中化学方程式大全

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: