Skip to main content
Kent Academic Repository

Secure Embedded Systems: The Threat of Reverse Engineering

McLoughlin, Ian Vince (2008) Secure Embedded Systems: The Threat of Reverse Engineering. In: 2008 14th IEEE International Conference on Parallel and Distributed Systems. . pp. 729-736. IEEE ISBN 978-0-7695-3434-3. (doi:10.1109/ICPADS.2008.126) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:48824)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1109/ICPADS.2008.126

Abstract

Companies releasing newly designed embedded products typically recoup the cost of development through initial sales, and thus are unlikely to welcome early competition based around rapid reverse engineering of their products. By contrast, competitors able to shorten time-to-market though reverse engineering will gain design cost and market share advantages. Reverse engineering for nefarious purposes appears to be commonplace, and has significant cost impact on industry sales and profitability. In the Embedded Systems MSc programme at Nanyang Technological University, we are aiming to raise awareness of the unique security issues related to the reverse engineering of embedded systems. This effort is largely through devoting 50% of the secure embedded systems course, ES6190 to reverse engineering (the remainder to traditional security concerns). This paper covers the reverse engineering problem scope, and our approach to raising awareness through the secure embedded systems course. A classification of hardware reverse engineering steps and mitigations is also presented for the first time, with an overview of a reverse engineering curriculum. Since the quantity of published literature related to the reverse-engineering of embedded systems lies somewhere between scarce and nonexistent, this paper presents a full overview of the topic before descussing educational aspects related to this.

Item Type: Conference or workshop item (Paper)
DOI/Identification number: 10.1109/ICPADS.2008.126
Uncontrolled keywords: design reuse, embedded security, embedded systems, reverse engineering
Subjects: T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Ian McLoughlin
Date Deposited: 07 Sep 2015 14:26 UTC
Last Modified: 05 Nov 2024 10:33 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/48824 (The current URI for this page, for reference purposes)

University of Kent Author Information

McLoughlin, Ian Vince.

Creator's ORCID: https://orcid.org/0000-0001-7111-2008
CReDIT Contributor Roles:
  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.