• search hit 1 of 2
Back to Result List

Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers

  • We present new methods for detecting plagiarized code segments using side-channel leakage of microcontrollers. Our approach uses the dependency of side-channel leakage on processed data and requires that the implementation under test accepts varying known input data. Detection tools are built upon a similarity matrix that contains the absolute correlation coefficient for each combination of time samples of the two possibly different implementations as result of side channel measurements. These methods are evaluated on smartcards with ATMega163 microcontroller using different test applications written in assembly language. We show that our methods are highly robust even against a skilled adversary who modifies the original assembly code in various ways. Our approach is non-intrusive, so that the application does not need to be additionally watermarked in order to be protected—the resulting pattern of data leakage of the microcontroller executing the code is considered as its own watermark.

Export metadata

Additional Services

Share in Twitter Search Google Scholar Availability
Metadaten
Document Type:Conference Object
Language:English
Author:Peter Samarin, Kerstin Lemke-Rust
Parent Title (English):Kim, Kim (Eds.): Information Security and Cryptology – ICISC 2017. 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers
First Page:155
Last Page:174
ISBN:978-3-319-78555-4
DOI:https://doi.org/10.1007/978-3-319-78556-1_9
Publisher:Springer
Place of publication:Cham
Date of first publication:2018/03/21
Tag:Code similarity analysis; Embedded software; IP protection; Side-channel watermarking; Similarity matrix; Software reverse engineering
Departments, institutes and facilities:Fachbereich Informatik
Dewey Decimal Classification (DDC):0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Entry in this database:2018/03/27