Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

19
Embedded Systems Presentation David Tietz EEL6935 Spring 2009

Transcript of Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Page 1: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Embedded Systems Presentation

David Tietz EEL6935 Spring 2009

Page 2: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Paper Selected:

“Secure Embedded Systems:

The Threat of Reverse Engineering”

By Ian McLoughlin Published in IEEE 2004

Page 3: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Reverse Engineering (RE)

•What is it?•Purpose:

To Gain A Better UnderstandingFor Design Piracy

Page 4: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Methods of Piracy

•Network attacks•Insider attacks•Head-hunters•Full on RE process

Page 5: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Creating A Product

•A company spends time and money in development of a product•The company releases the product•The company benefits from sales•In time, competition enters the market

Which helps to improve the original design.

Page 6: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Why RE is bad economics

•A company spends time and money in development of a product•The company releases the product•A competitor cheaply and rapidly reverse engineers the pioneering design

Can greatly undercut the selling price

•Hinders risk-taking

Page 7: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Economic Analysis

•Foiling RE takes money and time•Best outcome: You stop them

You never see the benefitCompetitors break into the market anyhow

•Difficult to sell a strategy•Even more difficult to gauge success

Page 8: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Bad for Embedded Systems

•By nature, they are generally small, portable, widely available devices•They tend to embody valuable intellectual property designs

Page 9: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Goal

•Maximize reverse engineering cost•Keep increased development cost low

Page 10: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Reverse Engineering Process

•Functionality•Physical Structure•Bill of Materials•System Architecture•Detailed Physical Layout•Schematic of Electrical Connectivity•Software

Page 11: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

How to Increase RE Costs

1. Additional time taken to reverse engineer the system

2. Greater levels of expertise required

3. The need for specialized equipment

Page 12: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

RE Mitigation

•Not possible to completely prevent it•Two Methods:

PassiveActive

Page 13: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

RE Mitigation Costs

•Increases NRE Costs•Increase in BOM•Delay in time to market

Page 14: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Low Cost Mitigation Techniques

•Protecting documentation•Monitor and limit information that employees may inadvertently provide•Custom casings•Missing silk screen•Wiring unused pins•Leaving unused planes on layers of the PCB

Page 15: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

RE Mitigation of Programmable Devices

•Custom Silicon•Ball Grid Array (BGA) Packaging•Back to Back BGA Layout

Page 16: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

RE Mitigation of Programmable Devices

•Don’t build ports onto PCB (jtag,etc)•Some provide security setting prevent readout of programmed bit stream•Use mesh overlays in custom ASICs

Page 17: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

RE Mitigation of Programmable Devices

FPGAs:•Use Antifuse devices•Use encryption for flashing

Flash:• Fill Unused space •Encrypt

Page 18: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Costs of Anti Reverse Engineering

Page 19: Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Questions?