{"title":"基于射频的逆向工程微控制器程序执行","authors":"Barron D. Stone, Samuel J. Stone","doi":"10.1109/NAECON.2015.7443060","DOIUrl":null,"url":null,"abstract":"This paper investigates a methodology for reverse engineering the sequence of operations executed by a microcontroller unit (MCU). Unintentional radio-frequency (RF) emissions are collected from a device and compared with a library of reference signals using a matched filter to identify operations. The reconstructed program sequence can be used to detect rogue device operation.","PeriodicalId":133804,"journal":{"name":"2015 National Aerospace and Electronics Conference (NAECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Radio frequency based reverse engineering of microcontroller program execution\",\"authors\":\"Barron D. Stone, Samuel J. Stone\",\"doi\":\"10.1109/NAECON.2015.7443060\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates a methodology for reverse engineering the sequence of operations executed by a microcontroller unit (MCU). Unintentional radio-frequency (RF) emissions are collected from a device and compared with a library of reference signals using a matched filter to identify operations. The reconstructed program sequence can be used to detect rogue device operation.\",\"PeriodicalId\":133804,\"journal\":{\"name\":\"2015 National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON.2015.7443060\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2015.7443060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Radio frequency based reverse engineering of microcontroller program execution
This paper investigates a methodology for reverse engineering the sequence of operations executed by a microcontroller unit (MCU). Unintentional radio-frequency (RF) emissions are collected from a device and compared with a library of reference signals using a matched filter to identify operations. The reconstructed program sequence can be used to detect rogue device operation.