Evaluating Component Hiding Techniques in Circuit Topologies

Security for cyber physical systems includes not only guaranteeing operational security of data they process, but preventing malicious alteration of their execution due to knowledge of their underlying structure. With the advent of software in the form of reprogrammable hardware descriptions, protection of field programmable units from malicious reverse engineering and subversion becomes more critical. The authors compare four different white-box transformation algorithms aimed at hindering adversarial reverse engineering by changing component and signal configurations within combinational logic programs.

Provided by: Institute of Electrical & Electronic Engineers Topic: Security Date Added: May 2012 Format: PDF

Find By Topic