2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833605
|View full text |Cite
|
Sign up to set email alerts
|

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…While the concept of standards appears to have many benefits, standardization processes can often be lengthy and require a great deal of resource commitment (e. g., time, expertise, willingness to compromise) from all involved stakeholders. It is possible that standards will end up at the lowest common denominator of industry and policymakers, will not be properly executed or even be flawed [24,95], or in the worst case, contain maliciously built-in backdoors [23].…”
Section: Standardsmentioning
confidence: 99%
“…While the concept of standards appears to have many benefits, standardization processes can often be lengthy and require a great deal of resource commitment (e. g., time, expertise, willingness to compromise) from all involved stakeholders. It is possible that standards will end up at the lowest common denominator of industry and policymakers, will not be properly executed or even be flawed [24,95], or in the worst case, contain maliciously built-in backdoors [23].…”
Section: Standardsmentioning
confidence: 99%
“…Code encryption is a method of converting code into ciphertext by using a key, and is preferred to prevent intellectual property leakage through key management. Nevertheless, due to the necessity of compliance with the regulations of the Institute of Electrical and Electronics Engineers (IEEE) [4], the encryption can only rely on the key of the electronic design automation (EDA) software company. This arrangement introduces a potential vulnerability, as there exists a risk of information disclosure from the EDA software company endowed with key management responsibilities.…”
Section: Introductionmentioning
confidence: 99%
“…hide all the parameters with important information and add false parameters in the code to heighten the complexity of analysis; (3). insert a strong covert module in critical paths to extend the critical paths to achieve the purpose of destroying the synthesized effect of the circuit; (4). split all the "aggregate" sentences to increase the code while ensuring that the functions of the obfuscated code are consistent with the source code.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, it was demonstrated that this standard suffers from side-channel leakage by EDA tools, and accordingly, to the disclosure and undetectable tampering of the IPs [3,20]. In addition, the private keys relied upon by the standard may be stolen directly from the EDA tool source code/binaries, as recently demonstrated in [29]. Such attacks highlight the importance of EDA tools in protecting the confidentiality of IPs.…”
Section: Introductionmentioning
confidence: 99%