In the past few years the growth of Internet of Things (IoT) devices, made the embedded security field more interesting for potential attackers. Indeed, the embedded devices spread from pacemakers to smart wallets and other variety of devices that can be a target for criminals. In this thesis, we studied and systematize the knowledge about the attacker's techniques and methodologies on embedded devices. We then report the result of applying the techniques and methodologies presented analyzing a real device, done as part of an industrial project under NDA, where we demonstrated how to extract an MCU's firmware through the power analysis of cryptographic algorithms.

Firmware extraction through power analysis of cryptographic algorithms

Benvenuto, Francesco
2021/2022

Abstract

In the past few years the growth of Internet of Things (IoT) devices, made the embedded security field more interesting for potential attackers. Indeed, the embedded devices spread from pacemakers to smart wallets and other variety of devices that can be a target for criminals. In this thesis, we studied and systematize the knowledge about the attacker's techniques and methodologies on embedded devices. We then report the result of applying the techniques and methodologies presented analyzing a real device, done as part of an industrial project under NDA, where we demonstrated how to extract an MCU's firmware through the power analysis of cryptographic algorithms.
2021-05-10
File in questo prodotto:
File Dimensione Formato  
858843-1243077.pdf

non disponibili

Tipologia: Altro materiale allegato
Dimensione 9.18 MB
Formato Adobe PDF
9.18 MB Adobe PDF

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14247/7137