Adafruit Industries just announced their next kit: a SIM card reader. Using the kit, you can read or write any SIM card. You could use this for fun things like recovering deleted contacts and SMS messages. The kit looks like a very straight forward design (based on [Dejan]‘s work); the only chip is a hex inverter and the board is powered by a regulated 9V battery. With all through-hole components, it should be easy to assemble. You can talk to it using the board mounted serial port or connect to the extra pin header using an FTDI USB cable just like the Boarduino. The FTDI option is bus powered, so you won’t need the battery. [ladyada] has collected some resources in case you want to learn more about smart cards.
Have you ever wanted to break open your IC and see where those pins really go? [nico] goes through his process of dissolving ICs to their core and photographing the tiny die. The technique involves liquefying the package in sulfuric acid until all the packaging material and pins are gone. He even explains how to use sodium bicarbonate (common baking soda) to neutralize the solution thus allowing for simple sink disposal. Although silicon hacking is generally done by funded hackers with a really nice lab, it is certainly possible to execute some of these techniques with limited equipment and chemical access. For instance, if you can’t get sulfuric acid, send your IC off to a failure analysis lab like MEFAS. For more information and stories on silicon hacking, check out [Chris Tarnovsky]‘s process for hacking smartcards and [bunnie]‘s talk Hacking silicon: secrets behind the epoxy curtain.
Wired recently posted an article and video detailing our friend [Chris Tarnovsky]‘s process for hacking smart cards. In the video, [Chris] shows how he strips away physical components of the chips inside the smartcards using various gadgets and chemicals.
The first step is to remove the chip from its plastic frame. After soaking it in acid for about 10 minutes, the epoxy is removed and the chip is exposed. After that the outer layer is loosened by soaking the chip in two solutions of acetone, the second being the “clean” one. Then the chip is placed on a hotplate where a drop of fuming nitric acid is applied with a dropper; the chip is washed again in an ultrasonic cleaner, removing any residue left.
[Chris] then returns the chip to the card. He will apply nail polish to act as a masking material. He scratches a hole through the polish with a needle held by a micro positioner in the area of interest. The hole is treated with hydrofluoric acid and then etched in short intervals until the desired layer of silicon is exposed. At this point, the card is fully prepped.
Now by powering the chip with the needle resting on the bus, [Chris] can read the code on the chip by sending it various commands and watching how it reacts. To see more of [Chris]‘s reverse engineering work, check out Flylogic Engineering’s Analytical Blog. It’s a enjoyable read even if you’re new to silicon hacking.