Embedded Systems Presentation David Tietz EEL6935 Spring 2009.

Slides:



Advertisements
Similar presentations
MICROPROCESSORS AND MICROCONTROLLERS
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Embedded Systems Design: A Unified Hardware/Software Introduction 1 Chapter 10: IC Technology.
FPGA (Field Programmable Gate Array)
NSFdeposit.com Telephone Checks. NSFdeposit.com Telephone Checks New Automated On-line Payment System One time sign-up; intelligent engine Unique file.
1 ICVisionCompany Profile Profile. 2 Agenda Who are we? Our Value Proposition ICVision Business Model Technologies and solutions Summary.
Using MIS 2e Chapter 3 Information Systems for
4 Information Security.
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
Implications and Security Issues of the Internet By Neelesh Patel.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Digital Rights Management © Knowledge Books & Software, 2012.
Programmable Logic Devices
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
CPE495 Computer Engineering Design I Emil Jovanov Electrical and Computer Engineering The University of Alabama in Huntsville Introduction to PCB Design.
Embedded System:ARM 1 The ARM Company. Embedded System:ARM 2 History of ARM.
Preventing Piracy and Reverse Engineering of SRAM FPGAs Bitstream Lilian Bossuet 1,
Chapter Two Information Technologies: Concepts and Management.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
February 4, 2002 John Wawrzynek
McGraw-Hill/Irwin Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved.
New-Product Development and Product Life-Cycle Strategies
SUSTAINABLE ENERGY REGULATION AND POLICY-MAKING FOR AFRICA Module 14 Energy Efficiency Module 14: DEMAND-SIDE MANAGEMENT.
Understanding Cash Flow Presented by Joanne L. Edgar, CPA.
What Is Entrepreneurship? By: Jaleesa Meredith. Differences between Employees and Entrepreneurs  Most Americans earn money by working a business  A.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
David I. McGeown "Where's the value in on site generation? Can real time metering and dispatch make a difference?
RBAP Confidential and Proprietary 1 Microsoft Licensing Know your options Eric Rivas Business Development Manager November 9, 2004.
Collaborating with Competitors
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
EGRE 427 Advanced Digital Design Figures from Application-Specific Integrated Circuits, Michael John Sebastian Smith, Addison Wesley, 1997 Chapter 4 Programmable.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Akamai Technologies - Overview RSA ® Conference 2013.
Intro to MicroControllers : Stellaris Launchpad Class 4: PCB Schematic Design & Board Layout.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
XELTEK Committed to Excellence. Company Overview Founded in 1991 Industry Leader: –Cost effective programming solutions for memory, µC and PLD –Programming.
Robert Brown1 The Value of an Idea “Great devices are created by engineers. Great products are created by marketing” Peter Druker.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
1 Title Slide (Name of your business) Names of students in groups Date of presentation Company logo, image, or photo 1-sentence summary of your business.
The Ethics of Emulation David Gale February 24 th.
EE3A1 Computer Hardware and Digital Design
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Word Processing Word processing packages such as Microsoft Word are text based. When text is entered via a keyboard, the characters are displayed on screen.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Physical security By Ola Abd el-latif Abbass Hassan.
Title Who are you, and what do you do?. Problem What are you trying to fix? Describe the problem facing consumers Make it: Understandable Memorable Persistent.
Marketing Manager Allan Cole. Marketing Manager’s develop marketing plans to sell product or services. Analyze markets for products and services. Study.
NPF Mechatronica-Pro Ltd., Tomsk, Russia Ph.D. Alexandr Karakulov Ph.D. Nikolay Gusev MexBIOS. Embedded software for motor/motion control chips.
Delivered by.. Love Jain p08ec907. Design Styles  Full-custom  Cell-based  Gate array  Programmable logic Field programmable gate array (FPGA)
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
[name of your product] Presented by [TEAM Name] ___________ Date.
Marketing Plan.
Copyright © 2012 Rockwell Automation, Inc. All rights reserved. WRAP-UP YESTERDAY… Q: What does mean Integrated Architecture? A: Bundle of products easily.
Interconnection and Access Presentation by Dale N. Hatfield Chief, Office of Engineering and Technology Federal Communications Commission June 6, 2000.
Android Root and its Providers: A double-edged sword Presented by: Peter Huang Paper written by: Hang Zhang, Dongdong She, Zhiyun Qian.
Strategic Management Chapter 6. Every organization needs to have a “big picture” about where it is going and how it will get there. Strategy Strategic.
MICROCONTROLLER INTERFACING WITH STEPPER MOTOR MADE BY: Pruthvirajsinh Jadeja ( ) COLLEGE:DIET BRANCH:EC.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Smart Streetlight Proof of Concept Group 3 03/26/16 Tucker Russ Thor Cutler Brandon Berry Anthony Giordano.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Custom ICs for Radiation Detection & Imaging
Programmable Hardware: Hardware or Software?
Systems Analysis and Design in a Changing World, Fifth Edition
Innovation management
“BPR AS A MEANS OF REINVENTING THE ORGANIZATION: AN OVERVIEW”
Presentation transcript:

Embedded Systems Presentation David Tietz EEL6935 Spring 2009

Paper Selected:  By Ian McLoughlin  Published in IEEE  2004

Reverse Engineering (RE) What is it? Purpose: To Gain A Better Understanding For Design Piracy

Methods of Piracy Network attacks Insider attacks Head-hunters Full on RE process

Creating A Product A company spends time and money in development of a product The company releases the product The company benefits from sales In time, competition enters the market Which helps to improve the original design.

Why RE is bad economics A company spends time and money in development of a product The company releases the product A competitor cheaply and rapidly reverse engineers the pioneering design Can greatly undercut the selling price Hinders risk-taking

Economic Analysis Foiling RE takes money and time Best outcome: You stop them You never see the benefit Competitors break into the market anyhow Difficult to sell a strategy Even more difficult to gauge success

Bad for Embedded Systems By nature, they are generally small, portable, widely available devices They tend to embody valuable intellectual property designs

Goal Maximize reverse engineering cost Keep increased development cost low

Reverse Engineering Process Functionality Physical Structure Bill of Materials System Architecture Detailed Physical Layout Schematic of Electrical Connectivity Software

How to Increase RE Costs 1.Additional time taken to reverse engineer the system 2.Greater levels of expertise required 3.The need for specialized equipment

RE Mitigation Not possible to completely prevent it Two Methods: Passive Active

RE Mitigation Costs Increases NRE Costs Increase in BOM Delay in time to market

Low Cost Mitigation Techniques Protecting documentation Monitor and limit information that employees may inadvertently provide Custom casings Missing silk screen Wiring unused pins Leaving unused planes on layers of the PCB

RE Mitigation of Programmable Devices Custom Silicon Ball Grid Array (BGA) Packaging Back to Back BGA Layout

RE Mitigation of Programmable Devices Don’t build ports onto PCB (jtag,etc) Some provide security setting prevent readout of programmed bit stream Use mesh overlays in custom ASICs

RE Mitigation of Programmable Devices FPGAs: Use Antifuse devices Use encryption for flashing Flash: Fill Unused space Encrypt

Costs of Anti Reverse Engineering

Questions?