Building a side channel based disassembler

Thomas Eisenbarth*, Christof Paar, Björn Weghenkel

*Korrespondierende/r Autor/-in für diese Arbeit
34 Zitate (Scopus)

Abstract

For the last ten years, side channel research has focused on extracting data leakage with the goal of recovering secret keys of embedded cryptographic implementations. For about the same time it has been known that side channel leakage contains information about many other internal processes of a computing device. In this work we exploit side channel information to recover large parts of the program executed on an embedded processor. We present the first complete methodology to recover the program code of a microcontroller by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply Hidden Markov Models to exploit prior knowledge about the program code. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios.

OriginalspracheEnglisch
TitelTransactions on Computational Science X - Special Issue on Security in Computing
Seitenumfang22
Band6340
Erscheinungsdatum01.12.2010
AuflagePART 1
Seiten78-99
ISBN (Print)978-3-642-17498-8
ISBN (elektronisch)978-3-642-17499-5
DOIs
PublikationsstatusVeröffentlicht - 01.12.2010

Fingerprint

Untersuchen Sie die Forschungsthemen von „Building a side channel based disassembler“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren