TY - GEN
T1 - Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting
AU - Lee, Robert
AU - Markantonakis, Konstantinos
AU - Akram, Raja
PY - 2016/5/30
Y1 - 2016/5/30
N2 - Embedded systems are small scale computing devices that are increasingly located in more of the items we use and own. The number of embedded systems in the world is increasing dramatically as the "internet of things" concept becomes more prevalent in the market. The value of the market for embedded systems is predicted to increase to being worth trillions of dollars by 2020. With great value in the embedded system market, there is a need for preventing unauthorised firmware tampering or product counterfeiting. Here is presented a technique for binding software to hardware instances that uses hardware intrinsic security properties of the devices being protected. The proposed technique provides assurance to manufacturers that only they can perform their hardware and software binding and create their products. Also presented is an FPGA implementation of the described scheme that binds the hardware and software together with only a 6.7% increase in execution time. Thus, making it difficult for an attacker to either counterfeit the device or extract the (software) Intellectual Property.
AB - Embedded systems are small scale computing devices that are increasingly located in more of the items we use and own. The number of embedded systems in the world is increasing dramatically as the "internet of things" concept becomes more prevalent in the market. The value of the market for embedded systems is predicted to increase to being worth trillions of dollars by 2020. With great value in the embedded system market, there is a need for preventing unauthorised firmware tampering or product counterfeiting. Here is presented a technique for binding software to hardware instances that uses hardware intrinsic security properties of the devices being protected. The proposed technique provides assurance to manufacturers that only they can perform their hardware and software binding and create their products. Also presented is an FPGA implementation of the described scheme that binds the hardware and software together with only a 6.7% increase in execution time. Thus, making it difficult for an attacker to either counterfeit the device or extract the (software) Intellectual Property.
U2 - 10.1145/2899015.2899029
DO - 10.1145/2899015.2899029
M3 - Conference contribution
T3 - Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security
SP - 70
EP - 81
BT - CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security
PB - ACM Press
ER -