Secure Embedded Systems: The Threat of Reverse Engineering

  title={Secure Embedded Systems: The Threat of Reverse Engineering},
  author={Ian Mcloughlin},
  journal={2008 14th IEEE International Conference on Parallel and Distributed Systems},
  • I. Mcloughlin
  • Published 8 December 2008
  • Computer Science
  • 2008 14th IEEE International Conference on Parallel and Distributed Systems
Companies releasing newly designed embedded products typically recoup the cost of development through initial sales, and thus are unlikely to welcome early competition based around rapid reverse engineering of their products. By contrast, competitors able to shorten time-to-market though reverse engineering will gain design cost and market share advantages. Reverse engineering for nefarious purposes appears to be commonplace, and has significant cost impact on industry sales and profitability… 

Figures and Tables from this paper

Security in Cyber-Enabled Design and Manufacturing: A Survey
Various security practices in digital domains,such as encryption and secret sharing, as well as manufacturing domains, such as physically unclonable function (PUF) and physical part watermarking for anticounterfeiting and tamper evidence purposes are discussed.
Securing Software Intellectual Property on Commodity and Legacy Embedded Systems
This work evaluates a generic embedded system to identify the security concerns in the context of SWIP protection and proposes a Portable Embedded Software Intellectual Property Security (PESIPS) system that can be deployed as a framework on both legacy and commodity systems.
Embedded Systems -- A Security Paradigm for Pervasive Computing
  • S. Sharma
  • Computer Science
    2013 International Conference on Communication Systems and Network Technologies
  • 2013
The identification and analysis of the threats, vulnerabilities and study of risk mitigation methods, potential attackers and common attack methodologies is critical in implementing security measures in design, development, exploitation and final disposal phases of the embedded system.
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives
This paper presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives, and surveys these challenges from two complementary perspectives: image processing and machine learning.
Practical Aspects of Employing Antireverse Engineering
A tension exists between transparency and protecting the confidentiality of the inner workings of electronic systems, and striking a balance means the acquirer and provider both accept some, but not necessarily the same, level of risk.
A Survey on Chip to System Reverse Engineering
This survey of RE and anti-RE techniques on the chip, board, and system levels should be of interest to both governmental and industrial bodies whose critical systems and intellectual property (IP) require protection from foreign enemies and counterfeiters who possess advanced RE capabilities.
A Methodology for Strategically Designing Physical Products that are Naturally Resistant to Reverse Engineering
A Methodology for Strategically Designing Physical Products that are Naturally Resistant to Reverse Engineering Stephen P. Harston Department of Mechanical Engineering, BYU Doctor of Philosophy
Mixed-granular architectural diversity for device security in the Internet of Things
This work presents a novel solution based on diversifying the hardware, so that finding and exploiting a vulnerability in one device does not put millions more at risk, and shows how low-overhead diversification can improve system security for area- and power-constrained IoT devices.
Customer Needs 2 . Conceptual Design 3 . Detail Design 4 . Manufacture Design Sketch 3 D Model Design Analysis Design Assembly ManufacturingProduct :
Various security practices in digital domains,such as encryption and secret sharing, as well as manufacturing domains, such as physically unclonable function (PUF) and physical part watermarking for anti-counterfeiting and tamper evidence purposes are classified.
The fundamentals of barriers to reverse engineering and their implementation into mechanical components
Reverse engineering is a common design strategy in industry. It is a term that has come to encompass a large array of engineering and design activities in the literature; however, in its basic form,


Practical Secure Hardware Design for Embedded Systems
Recommendations on incorporating security into the product development cycle, attack and threat models, and design solutions for enclosure, circuit board, and firmware layers are recommended.
Hardware assisted control flow obfuscation for embedded processors
A hardware assisted obfuscation technique that is capable of obfuscating the control flow information dynamically and makes it provably difficult for the attacker to extract any useful information is presented.
Reverse engineering and design recovery: a taxonomy
The authors define and relate six terms: forward engineering, reverse engineering, redocumentation, design recovery, restructuring, and reengineering to apply to the underlying engineering processes, regardless of the degree of automation applied.
Secure configuration of Field Programmable Gate arrays
Reconfiguration of FPGA's in the field is becoming increasingly popular particularly in networking applications and it is vital to provide security against malicious parties interfering with equipment functionality through this mechanism.
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
Hiding Circuit Topology from Unbounded Reverse Engineers
This paper discusses the problem of circuit obfuscation under a weaker assumption where the adversary knows only partial information regarding the circuit, namely, the circuit topology, and results are quite positive: there exist efficient circuitTopology obfuscation algorithms that transform every circuit C to circuit C′ with the same input-output behavior.
Design Principles for Tamper-Resistant Smartcard Processors
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power
Securing embedded systems
A top-down, multiabstraction layer approach for embedded security design reduces the risk of security flaws, letting designers maximize security while limiting area, energy, and computation costs
Preventing Piracy, Reverse Engineering, and Tampering
The authors survey current and promising now techniques designed to reliably preserve and protect software data vital to the authors' privacy and security.
Exporting solid models into finite element analysis (FEA) for reverse engineering of electrical components
  • T. Waggoner
  • Business, Engineering
    Proceedings Electrical Insulation Conference and Electrical Manufacturing Expo, 2005.
  • 2005
The reverse engineered part or one designed completely in a solid modeling (SM) package parallels the future manufacture of the part and corresponding assembly and Animation and analysis are integrated into the SM and FEA modeling of the parts.