Verifying Software Integrity in Embedded Systems: A Side Channel Approach. / Msgna, Mehari; Markantonakis, Konstantinos; Naccache, David; Mayes, Keith.

Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, 2014. p. 261-280 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Verifying Software Integrity in Embedded Systems: A Side Channel Approach. / Msgna, Mehari; Markantonakis, Konstantinos; Naccache, David; Mayes, Keith.

Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, 2014. p. 261-280 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Msgna, M, Markantonakis, K, Naccache, D & Mayes, K 2014, Verifying Software Integrity in Embedded Systems: A Side Channel Approach. in Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Lecture Notes in Computer Science, Paris, France, pp. 261-280. https://doi.org/10.1007/978-3-319-10175-0_18

APA

Msgna, M., Markantonakis, K., Naccache, D., & Mayes, K. (2014). Verifying Software Integrity in Embedded Systems: A Side Channel Approach. In Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (pp. 261-280). (Lecture Notes in Computer Science).. https://doi.org/10.1007/978-3-319-10175-0_18

Vancouver

Msgna M, Markantonakis K, Naccache D, Mayes K. Verifying Software Integrity in Embedded Systems: A Side Channel Approach. In Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France. 2014. p. 261-280. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-10175-0_18

Author

Msgna, Mehari ; Markantonakis, Konstantinos ; Naccache, David ; Mayes, Keith. / Verifying Software Integrity in Embedded Systems: A Side Channel Approach. Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, 2014. pp. 261-280 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{e2681cff8cbc4b0b8d05af87d9949b34,
title = "Verifying Software Integrity in Embedded Systems: A Side Channel Approach",
abstract = "In the last few decades embedded processors have invaded the modern lifestyle. Embedded systems have hardware and software components. Assuring the integrity of the software is very important as it is the component that controls what the hardware does through its instructions. Although there exist a number of software integrity verification techniques, they often fail to work in embedded environment. One main reason is, the memory read protection, frequently implemented in today{\textquoteright}s microprocessors, that prevent the verifier from reading out the necessary software parts. In this paper we show that side channel leakage (power consumption) can be used to verify the integrity of the software component without prior knowledge of the software code. Our approach uses instruction-level power consumption templates to extract information about executed instructions by the processor. Then this information together with pre-computed signatures are used to verify the integrity of the executed application using RSA signature screening algorithm. The instruction-level templates are constructed ahead of time using few authentic reference processors.",
keywords = "Side channel leakage, Power analysis, Application integrity, Templates, Principal components analysis, RSA signature screening ",
author = "Mehari Msgna and Konstantinos Markantonakis and David Naccache and Keith Mayes",
year = "2014",
month = apr,
day = "13",
doi = "10.1007/978-3-319-10175-0_18",
language = "English",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "261--280",
booktitle = "Constructive Side Channel Analysis and Secure Design",

}

RIS

TY - GEN

T1 - Verifying Software Integrity in Embedded Systems: A Side Channel Approach

AU - Msgna, Mehari

AU - Markantonakis, Konstantinos

AU - Naccache, David

AU - Mayes, Keith

PY - 2014/4/13

Y1 - 2014/4/13

N2 - In the last few decades embedded processors have invaded the modern lifestyle. Embedded systems have hardware and software components. Assuring the integrity of the software is very important as it is the component that controls what the hardware does through its instructions. Although there exist a number of software integrity verification techniques, they often fail to work in embedded environment. One main reason is, the memory read protection, frequently implemented in today’s microprocessors, that prevent the verifier from reading out the necessary software parts. In this paper we show that side channel leakage (power consumption) can be used to verify the integrity of the software component without prior knowledge of the software code. Our approach uses instruction-level power consumption templates to extract information about executed instructions by the processor. Then this information together with pre-computed signatures are used to verify the integrity of the executed application using RSA signature screening algorithm. The instruction-level templates are constructed ahead of time using few authentic reference processors.

AB - In the last few decades embedded processors have invaded the modern lifestyle. Embedded systems have hardware and software components. Assuring the integrity of the software is very important as it is the component that controls what the hardware does through its instructions. Although there exist a number of software integrity verification techniques, they often fail to work in embedded environment. One main reason is, the memory read protection, frequently implemented in today’s microprocessors, that prevent the verifier from reading out the necessary software parts. In this paper we show that side channel leakage (power consumption) can be used to verify the integrity of the software component without prior knowledge of the software code. Our approach uses instruction-level power consumption templates to extract information about executed instructions by the processor. Then this information together with pre-computed signatures are used to verify the integrity of the executed application using RSA signature screening algorithm. The instruction-level templates are constructed ahead of time using few authentic reference processors.

KW - Side channel leakage

KW - Power analysis

KW - Application integrity

KW - Templates

KW - Principal components analysis

KW - RSA signature screening

U2 - 10.1007/978-3-319-10175-0_18

DO - 10.1007/978-3-319-10175-0_18

M3 - Conference contribution

T3 - Lecture Notes in Computer Science

SP - 261

EP - 280

BT - Constructive Side Channel Analysis and Secure Design

CY - Paris, France

ER -