Download presentation
Presentation is loading. Please wait.
Published byMark Wilkins Modified over 9 years ago
1
Embedded Systems Presentation David Tietz EEL6935 Spring 2009
2
Paper Selected: By Ian McLoughlin Published in IEEE 2004
3
Reverse Engineering (RE) What is it? Purpose: To Gain A Better Understanding For Design Piracy
4
Methods of Piracy Network attacks Insider attacks Head-hunters Full on RE process
5
Creating A Product A company spends time and money in development of a product The company releases the product The company benefits from sales In time, competition enters the market Which helps to improve the original design.
6
Why RE is bad economics A company spends time and money in development of a product The company releases the product A competitor cheaply and rapidly reverse engineers the pioneering design Can greatly undercut the selling price Hinders risk-taking
7
Economic Analysis Foiling RE takes money and time Best outcome: You stop them You never see the benefit Competitors break into the market anyhow Difficult to sell a strategy Even more difficult to gauge success
8
Bad for Embedded Systems By nature, they are generally small, portable, widely available devices They tend to embody valuable intellectual property designs
9
Goal Maximize reverse engineering cost Keep increased development cost low
10
Reverse Engineering Process Functionality Physical Structure Bill of Materials System Architecture Detailed Physical Layout Schematic of Electrical Connectivity Software
11
How to Increase RE Costs 1.Additional time taken to reverse engineer the system 2.Greater levels of expertise required 3.The need for specialized equipment
12
RE Mitigation Not possible to completely prevent it Two Methods: Passive Active
13
RE Mitigation Costs Increases NRE Costs Increase in BOM Delay in time to market
14
Low Cost Mitigation Techniques Protecting documentation Monitor and limit information that employees may inadvertently provide Custom casings Missing silk screen Wiring unused pins Leaving unused planes on layers of the PCB
15
RE Mitigation of Programmable Devices Custom Silicon Ball Grid Array (BGA) Packaging Back to Back BGA Layout
16
RE Mitigation of Programmable Devices Don’t build ports onto PCB (jtag,etc) Some provide security setting prevent readout of programmed bit stream Use mesh overlays in custom ASICs
17
RE Mitigation of Programmable Devices FPGAs: Use Antifuse devices Use encryption for flashing Flash: Fill Unused space Encrypt
18
Costs of Anti Reverse Engineering
19
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.