Using RFID to Protect System Firmware
TBMG-6207
11/01/2008
- Content
Breeching the security of safety- or security-intensive products such as auto parts, set top boxes, military electronics, or smart batteries can be a lucrative business that is well worth the nominal investment required to create lookalike packaging and labeling, or to change the system firmware to allow unpaid access to licensed content. Because the counterfeiter does not incur any of the costs associated with product development, he quickly covers his capital investment at the expense of the authentic product manufacturer or service provider.
- Citation
- "Using RFID to Protect System Firmware," Mobility Engineering, November 1, 2008.