In the past few years the growth of Internet of Things (IoT) devices, made the embedded security field more interesting for potential attackers. Indeed, the embedded devices spread from pacemakers to smart wallets and other variety of devices that can be a target for criminals. In this thesis, we studied and systematize the knowledge about the attacker's techniques and methodologies on embedded devices. We then report the result of applying the techniques and methodologies presented analyzing a real device, done as part of an industrial project under NDA, where we demonstrated how to extract an MCU's firmware through the power analysis of cryptographic algorithms.
Firmware extraction through power analysis of cryptographic algorithms
Benvenuto, Francesco
2021/2022
Abstract
In the past few years the growth of Internet of Things (IoT) devices, made the embedded security field more interesting for potential attackers. Indeed, the embedded devices spread from pacemakers to smart wallets and other variety of devices that can be a target for criminals. In this thesis, we studied and systematize the knowledge about the attacker's techniques and methodologies on embedded devices. We then report the result of applying the techniques and methodologies presented analyzing a real device, done as part of an industrial project under NDA, where we demonstrated how to extract an MCU's firmware through the power analysis of cryptographic algorithms.File | Dimensione | Formato | |
---|---|---|---|
858843-1243077.pdf
non disponibili
Tipologia:
Altro materiale allegato
Dimensione
9.18 MB
Formato
Adobe PDF
|
9.18 MB | Adobe PDF |
I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/20.500.14247/7137