2019
DOI: 10.1007/s41635-019-00085-7
|View full text |Cite
|
Sign up to set email alerts
|

A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…AND and NAND are represented by 1(0001) and 14(1110), respectively. As shown in [7], multiple configurations for implementing basic logic gates, enabled by nonlinear dynamics, can lead to obfuscation against power side channel attack. The proposed design can also be leveraged for the same goal.…”
Section: Chaotic Oscillatormentioning
confidence: 99%
See 3 more Smart Citations
“…AND and NAND are represented by 1(0001) and 14(1110), respectively. As shown in [7], multiple configurations for implementing basic logic gates, enabled by nonlinear dynamics, can lead to obfuscation against power side channel attack. The proposed design can also be leveraged for the same goal.…”
Section: Chaotic Oscillatormentioning
confidence: 99%
“…The nonlinear dynamics inherent in a chaos-based design enables developing complex (e.g. multi-input, multi-output) logic gates using the same circuit [7]. The possible functions for an n-input logic gate is 2 2 n .…”
Section: Enhancement Of the Functionality Spacementioning
confidence: 99%
See 2 more Smart Citations
“…The initial state sensitivity is popularly known as the 'butterfly effect', after being coined by Lorenz in a lecture [6], as if a butterfly flapped its wings in Brazil a few weeks earlier and as a result, eventually, that minor perturbation has changed the nice sunny weather in Texas into a tornado. This deterministic aperiodicity and the sensitive dependence on the initial state of chaotic systems have proven their utility in numerous security applications such as data encryption [7], random number generation [8], [9], reconfigurable logic [10], [11], Physically Unclonable Function (PUF) [12], side-channel attack mitigation [13], secure communication [14], logic obfuscation [15] and so on.…”
Section: Introductionmentioning
confidence: 99%