Building a side channel based disassembler

Thomas Eisenbarth*, Christof Paar, Björn Weghenkel

*Corresponding author for this work
34 Citations (Scopus)

Abstract

For the last ten years, side channel research has focused on extracting data leakage with the goal of recovering secret keys of embedded cryptographic implementations. For about the same time it has been known that side channel leakage contains information about many other internal processes of a computing device. In this work we exploit side channel information to recover large parts of the program executed on an embedded processor. We present the first complete methodology to recover the program code of a microcontroller by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply Hidden Markov Models to exploit prior knowledge about the program code. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios.

Original languageEnglish
Title of host publicationTransactions on Computational Science X - Special Issue on Security in Computing
Number of pages22
Volume6340
Publication date01.12.2010
EditionPART 1
Pages78-99
ISBN (Print)978-3-642-17498-8
ISBN (Electronic)978-3-642-17499-5
DOIs
Publication statusPublished - 01.12.2010

Fingerprint

Dive into the research topics of 'Building a side channel based disassembler'. Together they form a unique fingerprint.

Cite this