DocumentCode
579095
Title
Evaluating component hiding techniques in circuit topologies
Author
McDonald, Jeffrey T. ; Kim, Yong C. ; Koranek, Daniel J. ; Parham, James D.
Author_Institution
Sch. of Comput. & Inf. Sci., Univ. of South Alabama, Mobile, AL, USA
fYear
2012
fDate
10-15 June 2012
Firstpage
1138
Lastpage
1143
Abstract
Security for Cyber physical systems includes not only guaranteeing operational security of data they process, but preventing malicious alteration of their execution due to knowledge of their underlying structure. With the advent of software in the form of reprogrammable hardware descriptions, protection of field programmable units from malicious reverse engineering and subversion becomes more critical. We compare four different white-box transformation algorithms aimed at hindering adversarial reverse engineering by changing component and signal configurations within combinational logic programs. We present security and efficiency analysis for these techniques and show positive results for achieving measurable hiding of signal and component information.
Keywords
combinational circuits; data encapsulation; field programmable gate arrays; invasive software; network topology; reverse engineering; Cyber physical system; circuit topology; combinational logic program; component hiding technique; data security; field programmable unit; malicious alteration; malicious reverse engineering; reprogrammable hardware description; signal configuration; Algorithm design and analysis; Encryption; Logic gates; Measurement; Multiplexing; Reverse engineering; Semantics; Circuit Analysis; Combinational Circuits; Computer Hacking; Computer Security; Programmable Logic Devices;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (ICC), 2012 IEEE International Conference on
Conference_Location
Ottawa, ON
ISSN
1550-3607
Print_ISBN
978-1-4577-2052-9
Electronic_ISBN
1550-3607
Type
conf
DOI
10.1109/ICC.2012.6364542
Filename
6364542
Link To Document