Side-Channel based Reverse Engineering for Microcontrollers
نویسندگان
چکیده
Since side-channel analysis was introduced in the mid-1990s, it has permanently been enhanced and become a reliable method for cryptanalysts to break physical implementations of cryptographic algorithms. Recently, these methods have become of interest to be used for reverse engineering program code running on microcontrollers (e.g., [QS02], [No03]), which are often used in security critical environments such as the financial sector. Until now, statistical methods using a huge number of side-channel observations are often used for this purpose. However, in some scenarios such an approach is not feasible, for example, when the target device is only available for a short period of time. Hence, in this work it is examined in how far the analysis of single observations of a side-channel can be utilized in order to gather information of a program. For that, a commercially available microcontroller is used as an exemplary target platform. Furthermore, templates as introduced by Chari et. al in [CRR02], specially suited to get the most information out of single traces, are applied as a side-channel analysis method. As a result, we present a power model for the PIC which provides a basis for a wire range of applications, as for example an improved DPA on this device. Moreover, in conjunction with templates we show that reverse engineering of secret parts of a cryptographic algorithm or program path detection of known code is feasible. In this thesis, the latter one is analyzed in more detail and formulated as an algorithm which can, for example, be used for debugging in the field, version checking, or it can be helpful for gaining a basic design level understanding of a program.
منابع مشابه
PUF – Physical Unclonable Functions
from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...
متن کاملReverse Engineering of Microcontrollers
In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of...
متن کاملA Two Stage Stochastic Programming Model of the Price Decision Problem in the Dual-channel Closed-loop Supply Chain
In this paper, we propose a new model for designing integrated forward/reverse logistics based on pricing policy in direct and indirect sales channel. The proposed model includes producers, disposal center, distributers and final customers. We assumed that the location of final customers is fixed. First, a deterministic mixed integer linear programming model is developed for integrated logistic...
متن کاملSide-Channel Based Reverse Engineering of Secret Algorithms
Two techniques are introduced that enable sidechannel based reverse engineering of secret algorithms. The first is sign-extended differential power analysis (SDPA) while the second technique targets table lookups. The SDPA reveals values that collide with the DPA target value within the circuitry. The interpretation of those values can provide significant amounts of the information about the al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008