학술논문

Microcontrollers as (In)Security Devices for Pervasive Computing Applications
Document Type
Periodical
Source
Proceedings of the IEEE Proc. IEEE Proceedings of the IEEE. 102(8):1157-1173 Aug, 2014
Subject
General Topics for Engineers
Engineering Profession
Aerospace
Bioengineering
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Fields, Waves and Electromagnetics
Geoscience
Nuclear Engineering
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Power, Energy and Industry Applications
Communication, Networking and Broadcast Technologies
Photonics and Electrooptics
Cryptography
Microcontrollers
Integrated circuit modeling
Embedded systems
Field programmable gate arrays
Algorithm design and analysis
Pervasive computing
Security
Code extraction
microcontroller
real-world attacks
reverse engineering
side-channel analysis
Language
ISSN
0018-9219
1558-2256
Abstract
Often overlooked, microcontrollers are the central component in embedded systems which drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low cost, and with myriads of pervasive applications. An increasing number of microcontroller-equipped systems are security and safety critical. In this tutorial, we take a critical look at the security aspects of today's microcontrollers. We demonstrate why the implementation of sensitive applications on a standard microcontroller can lead to severe security problems. To this end, we summarize various threats to microcontroller-based systems, including side-channel analysis and different methods for extracting embedded code. In two case studies, we demonstrate the relevance of these techniques in real-world applications: Both analyzed systems, a widely used digital locking system and the YubiKey 2 onetime password generator, turned out to be susceptible to attacks against the actual implementations, allowing an adversary to extract the cryptographic keys which, in turn, leads to a total collapse of the system security.