Data Security in Microprocessor Units

被引:0
作者
Kwiecien, Andrzej [1 ]
Mackowski, Michal [1 ]
Sidzina, Marcin [2 ]
机构
[1] Silesian Tech Univ, Inst Comp Sci, Gliwice, Poland
[2] Univ Bielsko Biala, Dept Mech Engn Fundamentals, Bielsko Biala, Poland
来源
COMPUTER NETWORKS, CN 2013 | 2013年 / 370卷
关键词
reverse engineering; data security; program code; microcontroller; conducted emission; electromagnetic disturbances; electromagnetic interference; simple power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protection of computer systems from an unauthorized access to the classified information is a very essential issue. Security of IT systems can concern various aspects, such as software security, connected with ensuring its confidentiality, as well as preventing its modification. Thanks to the developed methods, it is possible to analyze the program code based on the disturbances of voltage supply, which occur during the execution of the program. Moreover, it also enables to recognize the numbers of bits changes on microcontroller data bus, as a result of realized instruction. In such context, it can constitute a potential threat for data processed by microcontroller program or embedded systems. The presented method is very similar to simple power analysis method, which is very effective in relation to cryptographic algorithms, whose execution in many cases depends on processed data. The results indicate that presented method is an effective and low-cost attack, due to its simplicity in many real applications. Moreover, the research results inspire to study carefully the ways and methodology for developing software and hardware, which should reduce the possibility of software reverse engineering.
引用
收藏
页码:495 / 506
页数:12
相关论文
共 20 条
  • [1] Ahn M, 2006, LECT NOTES COMPUT SC, V3982, P48
  • [2] [Anonymous], 2006, INTRO ELECTROMAGNETI
  • [3] Bao F., 1998, Security Protocols. 5th International Workshop Proceedings, P115, DOI 10.1007/BFb0028164
  • [4] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [5] Dabbish E.A., 1999, WOST 1999
  • [6] Computer Communication Within Industrial Distributed Environment-a Survey
    Gaj, Piotr
    Jasperneite, Juergen
    Felser, Max
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 182 - 189
  • [7] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [8] Differential Power Analysis in the Smart card by Data simulation
    kootiani, A. Zadali mohammad
    Golabpour, A.
    Doostari, M.
    Broujerdian, M.
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 817 - +
  • [9] Kuhn MG, 2005, LECT NOTES COMPUT SC, V3659, P265
  • [10] Kwiecien A, 2012, COMM COM INF SC, V291, P191, DOI 10.1007/978-3-642-31217-5_21