IET Irish Signals and Systems Conference (ISSC 2009) 2009
DOI: 10.1049/cp.2009.1698
|View full text |Cite
|
Sign up to set email alerts
|

Identification of deterministic sequential finite state machines in unknown CMOS ICs

Abstract: Until now the efficient identification of unknown CMOS integrated circuits (ICs) has attracted a lot of interest. In particular, different invasive and non-invasive strategies have been developed for IC identification. However, invasive procedures always lead to the destruction of device under test. The non-invasive approaches published so far have the disadvantage that ICs are analysed by using very complex and time consuming algorithms. This paper presents a novel non-invasive procedure to determine nonlinea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
(7 reference statements)
0
4
0
Order By: Relevance
“…Table IV summarizes the average run-times for different machines with a set of 100 and 1000 input vectors and Figure 4 shows the recovery percentage at the end of first iteration. The brute-force recovery technique [8] based on input-output analysis could recover machines with a single input bit and up to 25 transitions in 1 minute, whereas technique [7] could take several hours and lacks applicability due to the requirement of terminating states. Our technique can handle machines that are 64x larger and also achieve much faster convergence.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Table IV summarizes the average run-times for different machines with a set of 100 and 1000 input vectors and Figure 4 shows the recovery percentage at the end of first iteration. The brute-force recovery technique [8] based on input-output analysis could recover machines with a single input bit and up to 25 transitions in 1 minute, whereas technique [7] could take several hours and lacks applicability due to the requirement of terminating states. Our technique can handle machines that are 64x larger and also achieve much faster convergence.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Relations between the other states are also revealed during power analysis which translate to InferredHD constraint. Both these constraints are applied in lines (6)(7)(8)(9)(10)(11)(12), depending on the inferred Hamming distances. In addition, functional analysis reveals input-output behavior which helps determine distinct states within the unknown machine.…”
Section: B Algorithm For Reverse Engineering Attackmentioning
confidence: 99%
“…The Brustcheck method follows several stages. The first of these is the pin determination based on electrostatic discharge theory, as described in [9], [17], and applied in both [15], [18], followed by a determination of the IC type: combinatorial, sequential linear, or sequential nonlinear. The FSM is then divided into Mealy or Moore automata.…”
Section: Prior Workmentioning
confidence: 99%
“…There is ample motivation to reverse engineer FSMs, with applications ranging from security [4,13] and verification [3,5] to the representation of client-side behavior of rich Internet applications [2].…”
Section: Introductionmentioning
confidence: 99%