Research and analysis of embedded software for undeclared capabilities

Authors

  • A.B. Batyrgaliev Satbayev University, Kazakhstan
  • O.A. Lizunov The Institute of Information and Computational Technologies SC MSHE RK, Kazakhstan

DOI:

https://doi.org/10.51301/ce.2025.i1.05

Keywords:

undeclared capabilities, Arduino UNO, software backdoor, XOR encryption, embedded software

Abstract

This paper presents the process of extracting, studying, and analyzing embedded software to confirm the presence of an undeclared capabilities. For this purpose, an educational scenario was modeled in which a software backdoor is inserted into an encryption algorithm implemented using Arduino IDE 2.3.2. The backdoor enables covert transmission of a secret key from the electronic device to an attacker over an Ethernet network in response to a predefined code phrase received via the same network interface. The electronic device used is the open-source Arduino UNO platform. To activate an undeclared feature by sending a passphrase to an electronic device, the attacker is expected to use a software backdoor implemented in the Python programming language in the PyCharm 2021.2.2 IDE.

Published

2025-03-31

How to Cite

Батыргалиев, А. ., & Лизунов, О. . (2025). Research and analysis of embedded software for undeclared capabilities. Computing &Amp; Engineering, 3(1), 29–33. https://doi.org/10.51301/ce.2025.i1.05

Issue

Section

Innovative Computing Systems and Engineering Solutions