Microcontroller Unit (MCU) Core of embedded system
3
Scenario 1: Key Extraction Attack
4
Scenario 2: Control Flow Integrity (CFI)
5
Code Execution Tracking
6
Execution tracking via Power Side-channel
7
Problem Formulation . Given code & power trace of MCU
8
Hidden Markov Model (HMM)
9
Overall Framework
10
Naïve State Definition
11
Basic Block as State
12
Unequal-length States (Cont'd) 2. Viterbl : recover the most probable state sequence
13
Complexity Analysis
14
Emission Distribution Design
15
Observation Symbol Design
16
Signal Extraction
17
Calibrated likelihood 1. Sample cach instruction's average likelihood during normal execution
18
Evaluation Setup
19
Abnormal Execution Tracking
20
Conclusion & Future Works
Description:
Explore a conference talk from CCS 2016 focusing on code execution tracking through power side-channel analysis. Delve into the authors' research on microcontroller unit (MCU) security, examining key extraction attacks and control flow integrity. Learn about the application of Hidden Markov Models for tracking code execution, including state definition, Viterbi algorithm implementation, and emission distribution design. Discover the evaluation setup, abnormal execution tracking techniques, and potential future developments in this critical area of embedded system security.