embedded systems presentation david tietz eel6935 spring 2009
TRANSCRIPT
![Page 1: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/1.jpg)
Embedded Systems Presentation
David Tietz EEL6935 Spring 2009
![Page 2: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/2.jpg)
Paper Selected:
“Secure Embedded Systems:
The Threat of Reverse Engineering”
By Ian McLoughlin Published in IEEE 2004
![Page 3: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/3.jpg)
Reverse Engineering (RE)
•What is it?•Purpose:
To Gain A Better UnderstandingFor Design Piracy
![Page 4: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/4.jpg)
Methods of Piracy
•Network attacks•Insider attacks•Head-hunters•Full on RE process
![Page 5: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/5.jpg)
Creating A Product
•A company spends time and money in development of a product•The company releases the product•The company benefits from sales•In time, competition enters the market
Which helps to improve the original design.
![Page 6: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/6.jpg)
Why RE is bad economics
•A company spends time and money in development of a product•The company releases the product•A competitor cheaply and rapidly reverse engineers the pioneering design
Can greatly undercut the selling price
•Hinders risk-taking
![Page 7: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/7.jpg)
Economic Analysis
•Foiling RE takes money and time•Best outcome: You stop them
You never see the benefitCompetitors break into the market anyhow
•Difficult to sell a strategy•Even more difficult to gauge success
![Page 8: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/8.jpg)
Bad for Embedded Systems
•By nature, they are generally small, portable, widely available devices•They tend to embody valuable intellectual property designs
![Page 9: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/9.jpg)
Goal
•Maximize reverse engineering cost•Keep increased development cost low
![Page 10: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/10.jpg)
Reverse Engineering Process
•Functionality•Physical Structure•Bill of Materials•System Architecture•Detailed Physical Layout•Schematic of Electrical Connectivity•Software
![Page 11: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/11.jpg)
How to Increase RE Costs
1. Additional time taken to reverse engineer the system
2. Greater levels of expertise required
3. The need for specialized equipment
![Page 12: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/12.jpg)
RE Mitigation
•Not possible to completely prevent it•Two Methods:
PassiveActive
![Page 13: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/13.jpg)
RE Mitigation Costs
•Increases NRE Costs•Increase in BOM•Delay in time to market
![Page 14: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/14.jpg)
Low Cost Mitigation Techniques
•Protecting documentation•Monitor and limit information that employees may inadvertently provide•Custom casings•Missing silk screen•Wiring unused pins•Leaving unused planes on layers of the PCB
![Page 15: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/15.jpg)
RE Mitigation of Programmable Devices
•Custom Silicon•Ball Grid Array (BGA) Packaging•Back to Back BGA Layout
![Page 16: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/16.jpg)
RE Mitigation of Programmable Devices
•Don’t build ports onto PCB (jtag,etc)•Some provide security setting prevent readout of programmed bit stream•Use mesh overlays in custom ASICs
![Page 17: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/17.jpg)
RE Mitigation of Programmable Devices
FPGAs:•Use Antifuse devices•Use encryption for flashing
Flash:• Fill Unused space •Encrypt
![Page 18: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/18.jpg)
Costs of Anti Reverse Engineering
![Page 19: Embedded Systems Presentation David Tietz EEL6935 Spring 2009](https://reader038.vdocuments.net/reader038/viewer/2022110322/56649d205503460f949f41e9/html5/thumbnails/19.jpg)
Questions?