Open Access Open Access  Restricted Access Subscription Access

Attacking Embedded Systems Through Power Analysis


Affiliations
1 Department of Information Technology, K L University, Vaddeswaram-522502, Guntur District, India
2 Department of Electrical and Electronics Engineering, K L University, Vaddeswaram, India
3 Department of Electronics and Communication Engineering, K L University, Vaddeswaram, India
4 Department of Computer Science and Engineering, K L University, Vaddeswaram, India
 

Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the literature suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provide for knowledge base. In this paper an experimental setup is proposed which is an embedded system by itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further, the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

Keywords

Power Analysis, Attacking, Embedded Systems, Knowledge Base, Crypto Server.
User
Notifications
Font Size

Abstract Views: 113

PDF Views: 0




  • Attacking Embedded Systems Through Power Analysis

Abstract Views: 113  |  PDF Views: 0

Authors

JKR. Sastry
Department of Information Technology, K L University, Vaddeswaram-522502, Guntur District, India
K. Subba Rao
Department of Electrical and Electronics Engineering, K L University, Vaddeswaram, India
N. Venkata Ram
Department of Electronics and Communication Engineering, K L University, Vaddeswaram, India
J. Sasi Bhanu
Department of Computer Science and Engineering, K L University, Vaddeswaram, India

Abstract


Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the literature suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provide for knowledge base. In this paper an experimental setup is proposed which is an embedded system by itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further, the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

Keywords


Power Analysis, Attacking, Embedded Systems, Knowledge Base, Crypto Server.