Building a side channel based disassembler

被引:69
作者
Eisenbarth T. [1 ]
Paar C. [2 ]
Weghenkel B. [2 ]
机构
[1] Department of Mathematical Sciences, Florida Atlantic University, Boca Raton
[2] Horst Görtz Institute for IT Security, Ruhr University Bochum
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010年 / 6340卷 / PART 1期
关键词
D O I
10.1007/978-3-642-17499-5_4
中图分类号
学科分类号
摘要
For the last ten years, side channel research has focused on extracting data leakage with the goal of recovering secret keys of embedded cryptographic implementations. For about the same time it has been known that side channel leakage contains information about many other internal processes of a computing device. In this work we exploit side channel information to recover large parts of the program executed on an embedded processor. We present the first complete methodology to recover the program code of a microcontroller by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply Hidden Markov Models to exploit prior knowledge about the program code. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios. © 2010 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:78 / 99
页数:21
相关论文
共 24 条
[1]  
Biham E., Shamir A., Differential fault analysis of secret key cryptosystems, LNCS, 1294, pp. 513-525, (1997)
[2]  
Bishop C.M., Pattern Recognition and Machine Learning (Information Science and Statistics), (2006)
[3]  
Chari S., Rao J.R., Rohatgi P., Template attacks, LNCS, 2523, pp. 13-28, (2003)
[4]  
Clavier C., Side channel analysis for reverse engineering (Scare) - An improved attack against a secret a3/a8 gsm algorithm, Cryptology EPrint Archive, Report 2004/049, (2004)
[5]  
Durbin R., Eddy S., Krogh A., Mitchison G., Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids, (1998)
[6]  
Fink G.A., Markov Models for Pattern Recognition, (2008)
[7]  
Goldack M., Side-Channel Based Reverse Engineering for Microcontrollers, (2008)
[8]  
Igel C., Glasmachers T., Heidrich-Meisner V., Shark, Journal of Machine Learning Research, 9, pp. 993-996, (2008)
[9]  
Kocher P.C., Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems, LNCS, 1109, pp. 104-113, (1996)
[10]  
Kocher P.C., Jaffe J., Jun B., Differential power analysis, LNCS, 1666, pp. 388-397, (1999)