How the Analysis of Electrical Current Consumption of Embedded Systems Could Lead to Code Reversing?

Presented at Black Hat USA 2012, July 25, 2012, 11:45 a.m. (60 minutes).

A practical approach of Power Analysis dedicated to reverse Engineering

This submission presents an experimental protocol developed to extract (part of) the code that runs on an embedded system using its power consumption

Experimental content (no math!), proof of concept, tools, limits, protections and prospective

The purpose of our study is to try to show how the analysis of electrical consumption of an embedded system enables us to find parts of the codes that it executes; this is done by presenting an operating mode, tools, a solid analysis, results, counter-measures and future research axes. It is all about trying to find another approach to the audit system. This approach aims at acquiring the code (reverse engineering) without having a physical access to the internal system components.

Our submission content will consist in making a quick presentation of the physical phenomenon at the origin of this type of information leak, confirming whether a sequence of instructions (opcode and data) can be found (reversed) by the analysis of electrical current used by the embedded system during the execution of a program, assessing then overcoming the technical difficulties in its achievement (Signal Acquisition, treatment and analysis, limitsÉ), presenting a proof of concept and possible countermeasures to limit the risks.


Presenters:

Links:

Similar Presentations: