Skip to main content

Data Security in Microprocessor Units

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 370))

Abstract

Protection of computer systems from an unauthorized access to the classified information is a very essential issue. Security of IT systems can concern various aspects, such as software security, connected with ensuring its confidentiality, as well as preventing its modification. Thanks to the developed methods, it is possible to analyze the program code based on the disturbances of voltage supply, which occur during the execution of the program. Moreover, it also enables to recognize the numbers of bits changes on microcontroller data bus, as a result of realized instruction. In such context, it can constitute a potential threat for data processed by microcontroller program or embedded systems. The presented method is very similar to simple power analysis method, which is very effective in relation to cryptographic algorithms, whose execution in many cases depends on processed data. The results indicate that presented method is an effective and low-cost attack, due to its simplicity in many real applications. Moreover, the research results inspire to study carefully the ways and methodology for developing software and hardware, which should reduce the possibility of software reverse engineering.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kuhn, M.G.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 265–279. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Tanaka, H.: Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 167–179. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Kwiecień, A., Stój, J.: The cost of redundancy in distributed real-time systems in steady state. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 106–120. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of computer security. Springer, Heidelberg (2003) ISBN 978-3-540-43101-5

    Book  MATH  Google Scholar 

  5. Stera, P.: Company’s data security – case study. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 290–296. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Gaj, P., Jasperneite, J., Felser, M.: Computer communication within industrial distributed environment – a survey. IEEE Transactions on Industrial Informatics 9(1), 182–189 (2013)

    Article  Google Scholar 

  7. Sidzina, M., Kwiecień, B.z.: The algorithms of transmission failure detection in master-slave networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 289–298. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Clayton, P.: Introduction to electromagnetic compatibility, 2nd edn. John Wiley and Sons, New Jersey (2006) ISBN: 978-0-471-75500-5

    Google Scholar 

  9. Montrose, M., Nakauchi, E.: Testing for EMC compliance: approaches and techniques. Wiley-IEEE Press, Canada (2004) ISBN: 978-0-471-43308-8

    Book  Google Scholar 

  10. Kwiecień, A., Maćkowski, M., Skoroniak, K.: Instruction prediction in microprocessor unit. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 427–433. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Kwiecień, A., Maćkowski, M., Skoroniak, K.: Reverse engineering of microprocessor program code. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 191–197. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Bao, F., Deng, H., et al.: Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) IW 1997. LNCS, vol. 1361, pp. 115–124. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  14. Ahn, M., Lee, H.-J.: Experiments and hardware countermeasures on power analysis attacks. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 48–53. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Dabbish, E.A., Messerges, T.S., Sloan, R.H.: Investigations of power analysis attacks on smartcards. In: WOST 1999, Proceedings of the USENIX Workshop on Smartcard Technology, Chicago (1999)

    Google Scholar 

  16. Vermoen, D., Witteman, M., Gaydadjiev, G.N.: Reverse engineering java card applets using power analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 138–149. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Mayer-Sommer, R.: Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 78–92. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Broujerdian, M., Doostari, M., Golabpour, A., et al.: Differential power analysis in the smart card by data simulation. In: Proceedings of the 2008 International Conference on MultiMedia and Information Technology, MMIT 2008, USA, pp. 817–821 (2008)

    Google Scholar 

  19. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  20. Kwiecień, A., Maćkowski, M., Skoroniak, K.: The analysis of microprocessor instruction cycle. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 417–426. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwiecień, A., Maćkowski, M., Sidzina, M. (2013). Data Security in Microprocessor Units. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2013. Communications in Computer and Information Science, vol 370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38865-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38865-1_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38864-4

  • Online ISBN: 978-3-642-38865-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics