How efficient is UDPi for protecting a processor’s firmware?
It is more efficient to encode data in a processor with UDPi since all values are valid. Data values in an 8-bit processor can be from 0x00 to 0xFF. If a value was originally 0x5C and has been altered by UDPi to be 0xDF, this last result is still a valid value for the processor as it is a possible value. UDPi, causing random valid values that result in an invalid operation of a device if the encoded code was transported to another UDPi processor using a different signature, has changed the normal flow of values. For a hacker, to find the original code is like re-writing the entire code. If the device is going to be illegitimately copied, the copy will be limited to the BOM (Bill of Material). The Intellectual Property (IP) will still be protected. All raw level data are hex or binary values (1’s and 0’s). UDPi exploits these low level values to encrypt data. All values at this raw level are valid. But when brought to an upper level, they are more intelligible. Text strings are the simp