DocumentCode :
38172
Title :
Microcontrollers as (In)Security Devices for Pervasive Computing Applications
Author :
Strobel, Daehyun ; Oswald, David ; Richter, Benjamin ; Schellenberg, Falk ; Paar, Christof
Author_Institution :
Horst Gortz Inst. for IT-Security, Ruhr Univ. Bochum, Bochum, Germany
Volume :
102
Issue :
8
fYear :
2014
fDate :
Aug. 2014
Firstpage :
1157
Lastpage :
1173
Abstract :
Often overlooked, microcontrollers are the central component in embedded systems which drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low cost, and with myriads of pervasive applications. An increasing number of microcontroller-equipped systems are security and safety critical. In this tutorial, we take a critical look at the security aspects of today´s microcontrollers. We demonstrate why the implementation of sensitive applications on a standard microcontroller can lead to severe security problems. To this end, we summarize various threats to microcontroller-based systems, including side-channel analysis and different methods for extracting embedded code. In two case studies, we demonstrate the relevance of these techniques in real-world applications: Both analyzed systems, a widely used digital locking system and the YubiKey 2 onetime password generator, turned out to be susceptible to attacks against the actual implementations, allowing an adversary to extract the cryptographic keys which, in turn, leads to a total collapse of the system security.
Keywords :
Internet of Things; cryptography; embedded systems; microcontrollers; ubiquitous computing; Internet of Things; IoT; YubiKey 2 onetime password generator; cryptographic key extraction; digital locking system; embedded code extraction; embedded systems; microcontroller-equipped systems; pervasive computing applications; security devices; side-channel analysis; Algorithm design and analysis; Cryptography; Embedded systems; Field programmable gate arrays; Integrated circuit modeling; Microcontrollers; Pervasive computing; Security; Code extraction; microcontroller; real-world attacks; reverse engineering; side-channel analysis;
fLanguage :
English
Journal_Title :
Proceedings of the IEEE
Publisher :
ieee
ISSN :
0018-9219
Type :
jour
DOI :
10.1109/JPROC.2014.2325397
Filename :
6826474
Link To Document :
بازگشت