Given two embedded systems that perform the same task, how can we tell without looking at their source code whether or not they have been independently developed? This is a serious problem that might cause large monetary loss for embedded software companies that distribute their intellectual property (IP) without taking countermeasures against plagiarists. By committing IP violation, the plagiarist can save the cost and time that it took to develop the original software and bring a system with the same functionality but for a cheaper price to market.We address this problem by making use of side channels and faults — properties of physical systems that allow us to distinguish some of the performed instructions and computations. By passively observing the side channels, or even by actively creating them, we can detect plagiarized IP and prove or disprove its existence. In this work we present an overview of our research for IP protection in software.Related lab set-ups for teaching side channel and fault analysis in undergraduate and graduate studies at universities are described. This includes our regularly used Differential Power Analysis (DPA) Lab and Differential Fault Analysis (DFA) Lab as well as advanced labs that result from our research in side channel and fault channel watermarking.
[1]
Eli Biham,et al.
Differential Fault Analysis of Secret Key Cryptosystems
,
1997,
CRYPTO.
[2]
Paul C. Kocher,et al.
Differential Power Analysis
,
1999,
CRYPTO.
[3]
P. Kocher,et al.
Differential power analysis, advances in cryptology-CRYPTO'99
,
1999
.
[4]
Christof Paar,et al.
Remote IP Protection Using Timing Channels
,
2014,
ICISC.
[5]
Peter Samarin,et al.
Fault-Channel Watermarks
,
2016,
WISTP.
[6]
Christof Paar,et al.
IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card
,
2004,
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7]
Jean-Jacques Quisquater,et al.
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD
,
2003,
CHES.
[8]
Peter Samarin,et al.
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers
,
2017,
ICISC.