Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research 2011
DOI: 10.1145/2179298.2179376
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic circuit variation for anti-tamper applications

Abstract: The electric power grid underlying our national infrastructure faces various challenges from adversaries that may exploit weaknesses gained through tampering and malicious reverse engineering. In this paper we describe a method for frustrating such adversaries based on polymorphic generation of circuit hardware with specific hiding properties in mind. We introduce component fusion as a technique for generating functionally equivalent variations of target logic that merge and blur the boundary between constitue… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Component Obfuscation: Many reverse engineering techniques engage in component recognition. Techniques have been proposed to increase the complexity of delineating components by changing the logic gates at the output and input boundaries of connected blocks (Boundary Blurring) [17], replacing an entire circuit with an obfuscated equivalent (Component Fusion) [18], [19] and targeting interconnections between two blocks for encryption [20].…”
Section: B Capabilities Of the Attackermentioning
confidence: 99%
“…Component Obfuscation: Many reverse engineering techniques engage in component recognition. Techniques have been proposed to increase the complexity of delineating components by changing the logic gates at the output and input boundaries of connected blocks (Boundary Blurring) [17], replacing an entire circuit with an obfuscated equivalent (Component Fusion) [18], [19] and targeting interconnections between two blocks for encryption [20].…”
Section: B Capabilities Of the Attackermentioning
confidence: 99%
“…By changing the hardware, generated circuits can cause an attacker's efforts to increase substantially without causing major increases in performance costs [18].…”
Section: Intellectual Property Protection and Anti-tampermentioning
confidence: 99%
“…Since any program can be represented logically as a circuit, we can generate equivalent circuits to produce dynamic polymorphic variants. We have produced extensive work on program and circuit obfuscation related to this approach [16,18,19]. As Figure 4 depicts, we let P be a program, defined as a circuit, from which want to generate a set of equivalent circuits.…”
Section: Circuit Variantsmentioning
confidence: 99%
See 1 more Smart Citation
“…Component fusion [13] ensures replacement of the entire circuit during every iteration of the algorithm. It accomplishes this by partitioning the circuit into subcircuits and then targets hiding of known information based on original component definitions.…”
Section: Deterministic Component Fusionmentioning
confidence: 99%