DocumentCode :
579095
Title :
Evaluating component hiding techniques in circuit topologies
Author :
McDonald, Jeffrey T. ; Kim, Yong C. ; Koranek, Daniel J. ; Parham, James D.
Author_Institution :
Sch. of Comput. & Inf. Sci., Univ. of South Alabama, Mobile, AL, USA
fYear :
2012
fDate :
10-15 June 2012
Firstpage :
1138
Lastpage :
1143
Abstract :
Security for Cyber physical systems includes not only guaranteeing operational security of data they process, but preventing malicious alteration of their execution due to knowledge of their underlying structure. With the advent of software in the form of reprogrammable hardware descriptions, protection of field programmable units from malicious reverse engineering and subversion becomes more critical. We compare four different white-box transformation algorithms aimed at hindering adversarial reverse engineering by changing component and signal configurations within combinational logic programs. We present security and efficiency analysis for these techniques and show positive results for achieving measurable hiding of signal and component information.
Keywords :
combinational circuits; data encapsulation; field programmable gate arrays; invasive software; network topology; reverse engineering; Cyber physical system; circuit topology; combinational logic program; component hiding technique; data security; field programmable unit; malicious alteration; malicious reverse engineering; reprogrammable hardware description; signal configuration; Algorithm design and analysis; Encryption; Logic gates; Measurement; Multiplexing; Reverse engineering; Semantics; Circuit Analysis; Combinational Circuits; Computer Hacking; Computer Security; Programmable Logic Devices;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2012 IEEE International Conference on
Conference_Location :
Ottawa, ON
ISSN :
1550-3607
Print_ISBN :
978-1-4577-2052-9
Electronic_ISBN :
1550-3607
Type :
conf
DOI :
10.1109/ICC.2012.6364542
Filename :
6364542
Link To Document :
بازگشت