Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2459985
|View full text |Cite
|
Sign up to set email alerts
|

Interlocking obfuscation for anti-tamper hardware

Abstract: Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain. Second, small malicious modifications to the design may not be detectable after fabrication without anti-tamper m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(25 citation statements)
references
References 6 publications
0
23
0
Order By: Relevance
“…For example, if an attacker owns n copies of the device where the number of attempts is X for each copy, he can try out different keys on each one. If each device is locked with key bit of size m, still an attacker has to try 2 m /(n * (X − 1)) Obfuscation Area Overhead (typical-case) 3 trials for all copies. Here, during (X-1) th attempt, an attacker would apply fault technique as crossing X th trial would lead to permanent locking.…”
Section: Security Evaluationsmentioning
confidence: 99%
“…For example, if an attacker owns n copies of the device where the number of attempts is X for each copy, he can try out different keys on each one. If each device is locked with key bit of size m, still an attacker has to try 2 m /(n * (X − 1)) Obfuscation Area Overhead (typical-case) 3 trials for all copies. Here, during (X-1) th attempt, an attacker would apply fault technique as crossing X th trial would lead to permanent locking.…”
Section: Security Evaluationsmentioning
confidence: 99%
“…Another technique that performs the obfuscation on RTL design is proposed in [9] where the authors considered multiple inputs together as code-word s for driving the obfuscated FSM. The key aspect of the design is that, even with wrong code-word, the state of FSM goes from initial entry mode to functional mode, but in that case, the behavior of the functional mode is different.…”
Section: Sequential Obfuscation On Behavioral Designmentioning
confidence: 99%
“…Concerning this set of assumptions, the first thing to consider is how well protected is the physical access to the server hosting the tenants' VMs. Obviously, any device that can be easily accessed, and tampered with, cannot be easily protected (even if some form of hardware mechanism and obfuscation can make this task more difficult [Chakraborty and Bhunia 2009], [Chakraborty and Bhunia 2010], [Desai et al 2013]). Then we need to consider the assumptions at the upper levels.…”
Section: Threat Models Of the Solutionsmentioning
confidence: 99%