Protection of computer systems from an unauthorized access to the classified information is a very essential issue. The research
deals with some aspect of this problem resulting from the fact, that for instance, an author of a software for embedded system
is not aware that it is possible to identify partly or entirely, program code. It can be done in non-invasive way, without
influence on the
... [Show full abstract] microprocessor internal structure and program memory. The authors intend to prove that it is possible to
recognise the instructions executing by certain type of microprocessor, analysing only the character of disturbances in the
power supply lines. The research results inspire to the more careful study of ways and methodology for developing software,
which should highly hinder the software reverse engineering.