Software-Hardware Binding for Protection of Sensitive Data in Embedded Software

📅 2026-03-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work proposes a lightweight software-hardware binding mechanism to protect sensitive tuning data—such as PID parameters—that constitute core intellectual property in embedded software from unauthorized extraction or reuse by cloned devices. The approach securely binds this sensitive data to device-unique SRAM-based Physical Unclonable Functions (PUFs) through Boolean logic operations, requiring no additional hardware. While unauthorized clones may execute the software, they suffer significant performance degradation due to the absence of the correct hardware fingerprint, and attackers face substantially increased difficulty in recovering the secret through dynamic analysis. Experimental evaluation on real-world microcontroller units (MCUs) demonstrates the effectiveness and practicality of the proposed scheme.

Technology Category

Application Category

📝 Abstract
Embedded software used in industrial systems frequently relies on data that ensures the correct and efficient operation of these systems. Thus, companies invest considerable resources in fine-tuning this data, making it their valuable intellectual property (IP). We present a novel protection mechanism for this IP that combines hardware fingerprints with Boolean logic. Unlike usual copy-protection approaches, unauthorised copies of the software still run on cloned devices but suboptimally. According to our security evaluation, only a complex dynamic analysis of the protected software running on the genuine target device can reveal the secret data. This makes the protection offered by our method more difficult to bypass. Notably, our approach does not require additional hardware, relying only on relatively simple updates to the software. We evaluate our protection mechanism by binding the parameters of a PID controller to a microcontroller unit (MCU) by using a physically unclonable function (PUF) based on its SRAM.
Problem

Research questions and friction points this paper is trying to address.

Software-Hardware Binding
Intellectual Property Protection
Embedded Software
Sensitive Data
Copy Protection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hardware-Software Binding
Physically Unclonable Function (PUF)
IP Protection
Embedded Security
Boolean Obfuscation
🔎 Similar Papers
No similar papers found.
B
Bernhard Fischer
Software Competence Center Hagenberg, Hagenberg, Austria
D
Daniel Dorfmeister
Software Competence Center Hagenberg, Hagenberg, Austria
Flavio Ferrarotti
Flavio Ferrarotti
Software Competence Center Hagenberg GmbH
finite model theorydescriptive complexityformal modelsdatabase theorybehavioural theory of algorithms
M
Manuel Penz
University of Applied Sciences Upper Austria, Hagenberg, Austria
M
Michael Kargl
University of Applied Sciences Upper Austria, Hagenberg, Austria
M
Martina Zeinzinger
University of Applied Sciences Upper Austria, Hagenberg, Austria
F
Florian Eibensteiner
University of Applied Sciences Upper Austria, Hagenberg, Austria