Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac...
| Published in: | Journal of Multidisciplinary Healthcare |
|---|---|
| Main Authors: | , |
| Format: | Article |
| Language: | English |
| Published: |
Dove Medical Press
2025-10-01
|
| Subjects: | |
| Online Access: | https://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDH |
| _version_ | 1848762454462431232 |
|---|---|
| author | T AH Sriraman H |
| author_facet | T AH Sriraman H |
| author_sort | T AH |
| collection | DOAJ |
| container_title | Journal of Multidisciplinary Healthcare |
| description | Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac.inAbstract: The Internet of Medical Things (IoMT), which revolutionizes modern healthcare, is expanding to provide remote support and treatment options. The device is handled by the patient or the healthcare provider to monitor the data continuously. When the IoMT is not handled with care by the authorized person, the sensitive data can be compromised by Man-At-The-End attacks (MATE). The gain of physical access allows the attacker to insert malicious code and tamper with the normal functionality, leading to wrong diagnosis and treatment. The altered performance of the medical device causes direct harm to patients. The existing software solutions do not provide complete security when it comes to attacks that gain physical access to devices. Physically Unclonable Functions (PUF) and Field Programmable Gate Arrays (FPGA) based security offers protection by establishing robust authentication through customizable logic, real-time data processing, and obfuscation. Identifying MATE attacks that are resistant to PUF/FPGA protection is crucial to offering a robust and resilient solution. The classification of critical MATE attacks specific to IoMT devices, Experimental validation using hardware platforms like Arduino Uno, Raspberry Pi, and ESP32 for reverse engineering is performed. Existing security measures available to protect the healthcare device, and how FPGA and PUF can provide better security against MATE attacks are explained. This paper uniquely reviews a thorough analysis of the vulnerability of PUF-enabled IoMT devices in the face of MATE attacks is presented. Possible futuristic solutions such as tamper-proof hardware, evolvable PUF, and AI-assisted anomaly detection for the identified problems, with experimental findings and security assessments, offer practical insights.Keywords: cyber threat, FPGA, IoMT vulnerabilities, PUF security |
| format | Article |
| id | doaj-art-6fbf83dbcfbc4c3d8962020cd4e2db1f |
| institution | Directory of Open Access Journals |
| issn | 1178-2390 |
| language | English |
| publishDate | 2025-10-01 |
| publisher | Dove Medical Press |
| record_format | Article |
| spelling | doaj-art-6fbf83dbcfbc4c3d8962020cd4e2db1f2025-10-09T16:42:06ZengDove Medical PressJournal of Multidisciplinary Healthcare1178-23902025-10-01Volume 18Issue 164796501107686Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and DefencesT AH0Sriraman H1Computer Science and EngineeringComputer Science and EngineeringAgila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac.inAbstract: The Internet of Medical Things (IoMT), which revolutionizes modern healthcare, is expanding to provide remote support and treatment options. The device is handled by the patient or the healthcare provider to monitor the data continuously. When the IoMT is not handled with care by the authorized person, the sensitive data can be compromised by Man-At-The-End attacks (MATE). The gain of physical access allows the attacker to insert malicious code and tamper with the normal functionality, leading to wrong diagnosis and treatment. The altered performance of the medical device causes direct harm to patients. The existing software solutions do not provide complete security when it comes to attacks that gain physical access to devices. Physically Unclonable Functions (PUF) and Field Programmable Gate Arrays (FPGA) based security offers protection by establishing robust authentication through customizable logic, real-time data processing, and obfuscation. Identifying MATE attacks that are resistant to PUF/FPGA protection is crucial to offering a robust and resilient solution. The classification of critical MATE attacks specific to IoMT devices, Experimental validation using hardware platforms like Arduino Uno, Raspberry Pi, and ESP32 for reverse engineering is performed. Existing security measures available to protect the healthcare device, and how FPGA and PUF can provide better security against MATE attacks are explained. This paper uniquely reviews a thorough analysis of the vulnerability of PUF-enabled IoMT devices in the face of MATE attacks is presented. Possible futuristic solutions such as tamper-proof hardware, evolvable PUF, and AI-assisted anomaly detection for the identified problems, with experimental findings and security assessments, offer practical insights.Keywords: cyber threat, FPGA, IoMT vulnerabilities, PUF securityhttps://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDHCyber threatFPGAIoMT vulnerabilitiesPUF security |
| spellingShingle | T AH Sriraman H Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences Cyber threat FPGA IoMT vulnerabilities PUF security |
| title | Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences |
| title_full | Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences |
| title_fullStr | Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences |
| title_full_unstemmed | Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences |
| title_short | Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences |
| title_sort | decoding the solution for man at the end attacks and reverse engineering on iomt devices an experimental review of techniques and defences |
| topic | Cyber threat FPGA IoMT vulnerabilities PUF security |
| url | https://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDH |
| work_keys_str_mv | AT tah decodingthesolutionformanattheendattacksandreverseengineeringoniomtdevicesanexperimentalreviewoftechniquesanddefences AT sriramanh decodingthesolutionformanattheendattacksandreverseengineeringoniomtdevicesanexperimentalreviewoftechniquesanddefences |
