Skip to main content

Instruction Prediction in Microprocessor Unit

  • Conference paper
Computer Networks (CN 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 160))

Included in the following conference series:

Abstract

Protection of computer systems from an unauthorized access to the classified information is a very essential issue. The research deals with some aspect of this problem resulting from the fact, that for instance, an author of a software for embedded system is not aware that it is possible to identify partly or entirely, program code. It can be done in non-invasive way, without influence on the microprocessor internal structure and program memory. The authors intend to prove that it is possible to recognise the instructions executing by certain type of microprocessor, analysing only the character of disturbances in the power supply lines. The research results inspire to the more careful study of ways and methodology for developing software, which should highly hinder the software reverse engineering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis: leaking secrets. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Piotrowski, R., Szczepański, S.: Input gate current uses to differential power analysis cryptographic device. XI International PhD Workshop. Wisła (2009)

    Google Scholar 

  3. Kwiecień, A., Maćkowski, M., Skoroniak, K.: The Analysis of Microprocessor Instruction Cycle. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 427–433. Springer, Heidelberg (2011)

    Google Scholar 

  4. Maćkowski, M., Skoroniak, K.: Instruction prediction in microprocessor unit based on power supply line. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 173–182. Springer, Heidelberg (2010)

    Google Scholar 

  5. Maćkowski, M., Skoroniak, K.: Electromagnetic emission measurement of microprocessor units. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2009. CCIS, vol. 39, pp. 103–110. Springer, Heidelberg (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwiecień, A., Maćkowski, M., Skoroniak, K. (2011). Instruction Prediction in Microprocessor Unit. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2011. Communications in Computer and Information Science, vol 160. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21771-5_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21771-5_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21770-8

  • Online ISBN: 978-3-642-21771-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics