Security

Evaluating Component Hiding Techniques in Circuit Topologies

Download Now Free registration required

Executive Summary

Security for cyber physical systems includes not only guaranteeing operational security of data they process, but preventing malicious alteration of their execution due to knowledge of their underlying structure. With the advent of software in the form of reprogrammable hardware descriptions, protection of field programmable units from malicious reverse engineering and subversion becomes more critical. The authors compare four different white-box transformation algorithms aimed at hindering adversarial reverse engineering by changing component and signal configurations within combinational logic programs.

  • Format: PDF
  • Size: 2723.84 KB