System-Level Tamper Protection Using MSP MCUs

نویسندگان

  • Bhargavi Nisarga
  • Eric Peeters
چکیده

Security in embedded systems is a topic that is gaining prominence as embedded systems and products are being deployed everywhere to be used in our everyday routines. Security concerns for embedded system developers and its users scales from adversaries having remote to physical access of the system. Increasing security for remote access includes incorporating secure data communication and secure software and firmware updates to the system; for example, leveraging industry-accepted cryptographic algorithms and secure communication protocols. This application report focuses on security concerns with adversaries having physical access to the system or product, understanding the need for system-level tamper protection, and how the security impact can be mitigated using system-level tamper detection and response functions. Implementing system-level tamper detection involves identifying security assets in the system and defining a trust line boundary around it; and any attempt to invade the trust line (for example, an electric-meter box) is considered a tamper attempt that must be detected. The detection must be followed with appropriate responses or actions that are taken to improve the security of the assets. Antitamper mechanisms must be carefully implemented to not significantly impact the cost and the power of the overall system solution. This application report describes the features supported by ultra-low-power MSP microcontrollers (MCUs) to enable a possible implementation of system-level tamper functions to achieve the aforementioned purpose.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Formal Model for Software Tamper Resistance

A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...

متن کامل

A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems

The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...

متن کامل

Tamper-resistant storage techniques for multimedia systems

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

متن کامل

Tamper Resistant Software Through Intent Protection

One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates tamper proofing. By hiding program intent, adversaries are reduced to non-semantics attacks such as blind disruption or operating system level attacks (e.g. buffer overflows). In this paper, we amplify the Barak resul...

متن کامل

Tamper Protection for Dynamic Service Level Agreement in Intelligent Agent Based Mobile Cloud Framework

In utility computing, customer requests varying services from software to infrastructure as and when needed. As a result, there are many mobile cloud providers provide this services on demand basis as per current market needs. To ensure compliance and security, these providers establish a contract popularly known as Service Level Agreement (SLA) which states the services and management aspects....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016