Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2023-23-6-1247-1250
Internal memory data protecting problems of the Renesas microcontrollers
Read the full article ';
Article in Russian
For citation:
Abstract
For citation:
Kondrashov K.K., Levina A.B. Internal memory data protecting problems of the Renesas microcontrollers. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2023, vol. 23, no. 6, pp. 1247–1250 (in Russian). doi: 10.17586/2226-1494-2023-23-6-1247-1250
Abstract
The problem of protecting the information contained in the internal memory of the Renesas RL78 Family Microcontrollers is considered. The vulnerability of these microcontrollers has been identified and investigated, which allows extracting data from the built-in flash memory using a programmer. A method of automated recovery of the contents of the entire memory area, based on specially developed software, has been tested. The results of the study indicate the insufficient effectiveness of the access restriction measures implemented by the manufacturer. A variant of changing the programmer’s control command, leading to an increase in data security, is described. A technique for complete recovery of flash memory data is presented, tested in a program developed in the LabVIEW environment.
Keywords: information security, MCU, Renesas RL78, flash memory, data extraction
Acknowledgements. The work was supports by the Ministry of Science and Higher Education of the Russian Federation No. 075-01024-21-02 dated 09/29/2021 (project FSEE-2021-0014).
References
Acknowledgements. The work was supports by the Ministry of Science and Higher Education of the Russian Federation No. 075-01024-21-02 dated 09/29/2021 (project FSEE-2021-0014).
References
- Spreitzer R., Moonsamy V., Korak T., Mangard S. Systematic classification of side-channel attacks: A case study for mobile devices. IEEE Communications Surveys and Tutorials, 2018, vol. 20, no. 1, pp. 465–488. https://doi.org/10.1109/comst.2017.2779824
- Kondrashov K.K., Denisov A.K., Luchinin V.V. Non-destructive method for ROM data monitoring via the energy consumption channel. Petersburg Electronics Journal, 2017, no. 2-3, pp. 97–102. (in Russian)
- Skorobogatov S.P. Semi-invasive attacks – A new approach to hardware security analysis. University of Cambridge, Computer Laboratory. 2005. Technical Report No. 630. Available at: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf. (accessed: 10.07.2023).
- Kaur S., Singh B., Kaur H. Stratification of hardware attacks: Side channel attacks and fault injection techniques. SN Computer Science, 2021, vol. 2, no. 3, pp. 183. https://doi.org/10.1007/s42979-021-00562-3
- Luchinin V.V., Sadovaia I.M. Information Security of Smart Microsystems and Technologies. St. Petersburg, Saint Petersburg Electrotechnical University "LETI" Publ., 2015, 157 p. (in Russian)
- MSP430 Family of Microcontrollers. Usage Tips. Moscow, Kompel, 2005, 544 p. (in Russian)
- Kondrashov K.K., Ershov M.I., Gasnikov A.O. Side-channel diagnostics for microprocessor devices: current state. Proceedings of Saint Petersburg Electrotechnical University Journal, 2016, no. 3, pp. 3–9. (in Russian)
- Alashik K., Efe A. Side channel attack. Gazi University Journal of Science. Part A: Engineering and innovation, 2019, vol. 6, no. 3, pp. 61–73.