2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364542
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating component hiding techniques in circuit topologies

Abstract: Security for Cyber physical systems includes not only guaranteeing operational security of data they process, but preventing malicious alteration of their execution due to knowledge of their underlying structure. With the advent of software in the form of reprogrammable hardware descriptions, protection of field programmable units from malicious reverse engineering and subversion becomes more critical. We compare four different white-box transformation algorithms aimed at hindering adversarial reverse engineer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…3 Logical attacks, which deal with observing the response of a system to stimuli, include software attacks, such as viruses and exploiting crypto/protocol weaknesses in a system. 3,4 Circuit protection techniques are generally software-based and include cryptography (encryption/decryption), obfuscation of codes, layouts and data flows, and software guards. [5][6]7,8 Examples of hardware-based circuit protection include protective coatings on integrated circuits, entire product enclosures, trusted processors and foundries, and the introduction of complexity into circuit design and macro-sized selfdestructing components that protect critical circuits by destroying them prior to exploitation.…”
Section: Section I Introductionmentioning
confidence: 99%
“…3 Logical attacks, which deal with observing the response of a system to stimuli, include software attacks, such as viruses and exploiting crypto/protocol weaknesses in a system. 3,4 Circuit protection techniques are generally software-based and include cryptography (encryption/decryption), obfuscation of codes, layouts and data flows, and software guards. [5][6]7,8 Examples of hardware-based circuit protection include protective coatings on integrated circuits, entire product enclosures, trusted processors and foundries, and the introduction of complexity into circuit design and macro-sized selfdestructing components that protect critical circuits by destroying them prior to exploitation.…”
Section: Section I Introductionmentioning
confidence: 99%
“…In this research, we present the Program Encryption Toolkit (PET) and its associated graphical user interface (PETGUI) as a freely available resource for both educators and students who are learning early concepts related to digital logic. PET itself encompasses Java software contributed by undergraduate, master's and PhD researchers over a 15-year period and is used primarily to further research in circuit-based protection against malicious reverse engineering and subversion [1][2][3][4][5][6][7][8][9][10][11]. The code base has provided a means to also introduce software engineering concepts to students, including object-oriented (OO) analysis and design, OO design patterns, source code configuration, and team development.…”
Section: Introductionmentioning
confidence: 99%
“…For digital logic courses, PETGUI offers a rich set of useful functionalities that can be integrated into course curriculum and educational outreach. The software is a front-end for a Java-based code repository that supports advanced experiments in program protection and exploitation related to hardware security that has been part of several master's and doctoral thesis topics [1][2][3][4][5][6][7][8][9][10][11]. The software integrates popular algorithms and synthesis tools such as UC Berkeley's Espresso [12] and ABC [13] in an easy-to-use interface.…”
Section: Introductionmentioning
confidence: 99%