Reverse Engineering of Microcontrollers
نویسنده
چکیده
In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of products are explained.
منابع مشابه
Side-Channel based Reverse Engineering for Microcontrollers
Since side-channel analysis was introduced in the mid-1990s, it has permanently been enhanced and become a reliable method for cryptanalysts to break physical implementations of cryptographic algorithms. Recently, these methods have become of interest to be used for reverse engineering program code running on microcontrollers (e.g., [QS02], [No03]), which are often used in security critical env...
متن کاملReverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
In this article, a methodology to extract Flash EEPROM memory contents is presented. Samples are first backside prepared to expose the tunnel oxide of floating gate transistors. Then, a Scanning Electron Microscope (SEM) in the so called Passive Voltage Contrast (PVC) mode allows distinguishing ‘0’ and ‘1’ bit values stored in individual memory cell. Using SEM operator-free acquisition and stan...
متن کاملMicrocontrollers Fundamentals for Engineers and Scientists
This book provides practicing scientists and engineers a tutorial on the fundamental concepts and use of microcontrollers. Today, microcontrollers, or single integrated circuit (chip) computers, play critical roles in almost all instrumentation and control systems. Most existing books are written for undergraduate and graduate students taking an electrical and/or computer engineering course. Fu...
متن کاملPUF – Physical Unclonable Functions
from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...
متن کاملInnovative Approach to Teaching an Undergraduate Microprocessor Class
This paper investigates the advantages of teaching PICMicro® microcontrollers over the traditional teaching approach using full-blown microprocessors. Traditionally, most schools have taught the undergraduate microprocessor class using full-blown microprocessors such as the Z80, 68000, 8051, and the 68HC11. Although these microprocessors have been widely used in microcomputers and microcontroll...
متن کامل