Tamper resistance mechanisms for secure embedded systems
- 21 June 2004
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
To secure digital assets, a tasteful integration of a variety of technologiesand processes is necessary. Tamper-resistance is being increasinglyused as an important piece of a more comprehensive securitysystem. It provides an effective barrier to entry and protectsdigital assets in the embedded systems from most people and mostattacks. Embedded systems pose unique security challenges becausethey are largely used in relationships where one party wantsto put a secure, embedded device, in the hands of another, withthe assurance that the second party cannot modify/hack the device.First, we outline the major attacks that threaten the security of anembedded system. The vulnerability landscape of an embeddedsystem is a vast expanse of attacks. A good understanding of thethreats is necessary so that countermeasures can be devised to protectagainst threats that pose the greatest risk. Second, we presentcountermeasures and discuss their effectiveness in protecting thecrown jewels of an embedded system: boot code, operating systemsoftware and embedded hardware. A clear understanding of attacksand countermeasures enables a system architect to make rationalinvestment decisions in designing a secure, embedded system.Keywords
This publication has 21 references indexed in Scilit:
- Security in embedded systemsACM Transactions on Embedded Computing Systems, 2004
- Using memory errors to attack a virtual machinePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Embedding security in wireless embedded systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphersIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2002
- ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart CardsLecture Notes in Computer Science, 2001
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999
- Power Analysis Attacks of Modular Exponentiation in SmartcardsLecture Notes in Computer Science, 1999
- Soft Tempest: Hidden Data Transmission Using Electromagnetic EmanationsLecture Notes in Computer Science, 1998
- Cipher instruction search attack on the bus-encryption security microcontroller DS5002FPIEEE Transactions on Computers, 1998
- Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security, 1985