System-Level Tamper Protection Using MSP MCUs
نویسندگان
چکیده
Security in embedded systems is a topic that is gaining prominence as embedded systems and products are being deployed everywhere to be used in our everyday routines. Security concerns for embedded system developers and its users scales from adversaries having remote to physical access of the system. Increasing security for remote access includes incorporating secure data communication and secure software and firmware updates to the system; for example, leveraging industry-accepted cryptographic algorithms and secure communication protocols. This application report focuses on security concerns with adversaries having physical access to the system or product, understanding the need for system-level tamper protection, and how the security impact can be mitigated using system-level tamper detection and response functions. Implementing system-level tamper detection involves identifying security assets in the system and defining a trust line boundary around it; and any attempt to invade the trust line (for example, an electric-meter box) is considered a tamper attempt that must be detected. The detection must be followed with appropriate responses or actions that are taken to improve the security of the assets. Antitamper mechanisms must be carefully implemented to not significantly impact the cost and the power of the overall system solution. This application report describes the features supported by ultra-low-power MSP microcontrollers (MCUs) to enable a possible implementation of system-level tamper functions to achieve the aforementioned purpose.
منابع مشابه
Towards a Formal Model for Software Tamper Resistance
A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...
متن کاملA Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...
متن کاملTamper-resistant storage techniques for multimedia systems
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...
متن کاملTamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates tamper proofing. By hiding program intent, adversaries are reduced to non-semantics attacks such as blind disruption or operating system level attacks (e.g. buffer overflows). In this paper, we amplify the Barak resul...
متن کاملTamper Protection for Dynamic Service Level Agreement in Intelligent Agent Based Mobile Cloud Framework
In utility computing, customer requests varying services from software to infrastructure as and when needed. As a result, there are many mobile cloud providers provide this services on demand basis as per current market needs. To ensure compliance and security, these providers establish a contract popularly known as Service Level Agreement (SLA) which states the services and management aspects....
متن کامل