Reverse Engineering of Microcontrollers

نویسنده

  • Fabian Weise
چکیده

In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of products are explained.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side-Channel based Reverse Engineering for Microcontrollers

Since side-channel analysis was introduced in the mid-1990s, it has permanently been enhanced and become a reliable method for cryptanalysts to break physical implementations of cryptographic algorithms. Recently, these methods have become of interest to be used for reverse engineering program code running on microcontrollers (e.g., [QS02], [No03]), which are often used in security critical env...

متن کامل

Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy

In this article, a methodology to extract Flash EEPROM memory contents is presented. Samples are first backside prepared to expose the tunnel oxide of floating gate transistors. Then, a Scanning Electron Microscope (SEM) in the so called Passive Voltage Contrast (PVC) mode allows distinguishing ‘0’ and ‘1’ bit values stored in individual memory cell. Using SEM operator-free acquisition and stan...

متن کامل

Microcontrollers Fundamentals for Engineers and Scientists

This book provides practicing scientists and engineers a tutorial on the fundamental concepts and use of microcontrollers. Today, microcontrollers, or single integrated circuit (chip) computers, play critical roles in almost all instrumentation and control systems. Most existing books are written for undergraduate and graduate students taking an electrical and/or computer engineering course. Fu...

متن کامل

PUF – Physical Unclonable Functions

from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...

متن کامل

Innovative Approach to Teaching an Undergraduate Microprocessor Class

This paper investigates the advantages of teaching PICMicro® microcontrollers over the traditional teaching approach using full-blown microprocessors. Traditionally, most schools have taught the undergraduate microprocessor class using full-blown microprocessors such as the Z80, 68000, 8051, and the 68HC11. Although these microprocessors have been widely used in microcomputers and microcontroll...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015