Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences

Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac...

Full description

Bibliographic Details
Published in:Journal of Multidisciplinary Healthcare
Main Authors: T AH, Sriraman H
Format: Article
Language:English
Published: Dove Medical Press 2025-10-01
Subjects:
Online Access:https://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDH
_version_ 1848762454462431232
author T AH
Sriraman H
author_facet T AH
Sriraman H
author_sort T AH
collection DOAJ
container_title Journal of Multidisciplinary Healthcare
description Agila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac.inAbstract: The Internet of Medical Things (IoMT), which revolutionizes modern healthcare, is expanding to provide remote support and treatment options. The device is handled by the patient or the healthcare provider to monitor the data continuously. When the IoMT is not handled with care by the authorized person, the sensitive data can be compromised by Man-At-The-End attacks (MATE). The gain of physical access allows the attacker to insert malicious code and tamper with the normal functionality, leading to wrong diagnosis and treatment. The altered performance of the medical device causes direct harm to patients. The existing software solutions do not provide complete security when it comes to attacks that gain physical access to devices. Physically Unclonable Functions (PUF) and Field Programmable Gate Arrays (FPGA) based security offers protection by establishing robust authentication through customizable logic, real-time data processing, and obfuscation. Identifying MATE attacks that are resistant to PUF/FPGA protection is crucial to offering a robust and resilient solution. The classification of critical MATE attacks specific to IoMT devices, Experimental validation using hardware platforms like Arduino Uno, Raspberry Pi, and ESP32 for reverse engineering is performed. Existing security measures available to protect the healthcare device, and how FPGA and PUF can provide better security against MATE attacks are explained. This paper uniquely reviews a thorough analysis of the vulnerability of PUF-enabled IoMT devices in the face of MATE attacks is presented. Possible futuristic solutions such as tamper-proof hardware, evolvable PUF, and AI-assisted anomaly detection for the identified problems, with experimental findings and security assessments, offer practical insights.Keywords: cyber threat, FPGA, IoMT vulnerabilities, PUF security
format Article
id doaj-art-6fbf83dbcfbc4c3d8962020cd4e2db1f
institution Directory of Open Access Journals
issn 1178-2390
language English
publishDate 2025-10-01
publisher Dove Medical Press
record_format Article
spelling doaj-art-6fbf83dbcfbc4c3d8962020cd4e2db1f2025-10-09T16:42:06ZengDove Medical PressJournal of Multidisciplinary Healthcare1178-23902025-10-01Volume 18Issue 164796501107686Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and DefencesT AH0Sriraman H1Computer Science and EngineeringComputer Science and EngineeringAgila Harshini T, Harini Sriraman Department of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, IndiaCorrespondence: Harini Sriraman, Vellore Institute of Technology, Chennai Campus, Vandalur- Kelambakkam Road, Chennai, TN, 600127, India, Email harini.s@vit.ac.inAbstract: The Internet of Medical Things (IoMT), which revolutionizes modern healthcare, is expanding to provide remote support and treatment options. The device is handled by the patient or the healthcare provider to monitor the data continuously. When the IoMT is not handled with care by the authorized person, the sensitive data can be compromised by Man-At-The-End attacks (MATE). The gain of physical access allows the attacker to insert malicious code and tamper with the normal functionality, leading to wrong diagnosis and treatment. The altered performance of the medical device causes direct harm to patients. The existing software solutions do not provide complete security when it comes to attacks that gain physical access to devices. Physically Unclonable Functions (PUF) and Field Programmable Gate Arrays (FPGA) based security offers protection by establishing robust authentication through customizable logic, real-time data processing, and obfuscation. Identifying MATE attacks that are resistant to PUF/FPGA protection is crucial to offering a robust and resilient solution. The classification of critical MATE attacks specific to IoMT devices, Experimental validation using hardware platforms like Arduino Uno, Raspberry Pi, and ESP32 for reverse engineering is performed. Existing security measures available to protect the healthcare device, and how FPGA and PUF can provide better security against MATE attacks are explained. This paper uniquely reviews a thorough analysis of the vulnerability of PUF-enabled IoMT devices in the face of MATE attacks is presented. Possible futuristic solutions such as tamper-proof hardware, evolvable PUF, and AI-assisted anomaly detection for the identified problems, with experimental findings and security assessments, offer practical insights.Keywords: cyber threat, FPGA, IoMT vulnerabilities, PUF securityhttps://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDHCyber threatFPGAIoMT vulnerabilitiesPUF security
spellingShingle T AH
Sriraman H
Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
Cyber threat
FPGA
IoMT vulnerabilities
PUF security
title Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
title_full Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
title_fullStr Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
title_full_unstemmed Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
title_short Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences
title_sort decoding the solution for man at the end attacks and reverse engineering on iomt devices an experimental review of techniques and defences
topic Cyber threat
FPGA
IoMT vulnerabilities
PUF security
url https://www.dovepress.com/decoding-the-solution-for-man-at-the-end-attacks-and-reverse-engineeri-peer-reviewed-fulltext-article-JMDH
work_keys_str_mv AT tah decodingthesolutionformanattheendattacksandreverseengineeringoniomtdevicesanexperimentalreviewoftechniquesanddefences
AT sriramanh decodingthesolutionformanattheendattacksandreverseengineeringoniomtdevicesanexperimentalreviewoftechniquesanddefences