scispace - formally typeset
Journal ArticleDOI

Reconfiguration-Based VLSI Design for Security

TLDR
This paper presents reconfigurable reversible computing-based cryptography, and a generic reconfiguration-based VLSI design-for-security methodology, and prevents software- or hardware-based code injection attacks based on a SPARC V8 LEON2 processor.
Abstract
Reconfigurable computing is a critical technology for achieving nanoelectronic systems of yield and reliability. In this paper, we present that reconfigurable computing is further a critical technology for achieving hardware security in the presence of supply chain adversaries. Specifically, reconfigurable implementation of a given logic function achieves design obfuscation, while reconfiguration for difference logic functions further achieves moving target defense. We further present reconfigurable reversible computing-based cryptography, and a generic reconfiguration-based VLSI design-for-security methodology. In our case studies based on a SPARC V8 LEON2 processor, we prevent software- or hardware-based code injection attacks at cost of 0.72% area increase, negligible power consumption increase and no performance degradation; we further prevent a hardware Trojan from gaining unauthorized memory access at cost of 4.42% area increase, negligible power consumption increase, and 11.30% critical path delay increase.

read more

Citations
More filters
Journal ArticleDOI

A survey of hardware Trojan threat and defense

TL;DR: An IC market model is elaborate to illustrate the potential HT threats faced by the parties involved in the model and categorize the recent research advances in the countermeasures against HT attacks.
Journal ArticleDOI

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges

TL;DR: In this article, the authors provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and secure architecture.
Journal ArticleDOI

Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation

TL;DR: This paper proposes to protect all the states with a low-cost state-deflection-based obfuscation method, which dynamically deflects state transitions from the original transition path to a black hole cluster if a wrong key is applied.
Journal ArticleDOI

VLSI supply chain security risks and mitigation techniques: A survey

TL;DR: A systematic survey on security risks in the VLSI supply chain and their corresponding mitigation techniques is presented.
Proceedings ArticleDOI

Transistor-level camouflaged logic locking method for monolithic 3D IC security

TL;DR: This work proposes a novel method for transistor-level logic locking to address intellectual property (IP) piracy and reverse engineering attacks in monolithic three-dimensional (M3D) ICs.
References
More filters
Journal ArticleDOI

Graph-Based Algorithms for Boolean Function Manipulation

TL;DR: In this paper, the authors present a data structure for representing Boolean functions and an associated set of manipulation algorithms, which have time complexity proportional to the sizes of the graphs being operated on, and hence are quite efficient as long as the graphs do not grow too large.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book ChapterDOI

Differential Fault Analysis of Secret Key Cryptosystems

TL;DR: This work states that this attack is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES).
Related Papers (5)