Hardware Security Primitives by Mark Tehranipoor & Nitin Pundir & Nidish Vashistha & Farimah Farahmandi
Author:Mark Tehranipoor & Nitin Pundir & Nidish Vashistha & Farimah Farahmandi
Language: eng
Format: epub
ISBN: 9783031191855
Publisher: Springer International Publishing
Fig. 10.2(a) The illustration of CamoSecGen blockâs layout with four camouflaged inverter/buffers that generate the secret code. (b) Illustration of Camo Input Mapping block consisting of four camouflaged inverters/buffers to hide the transformations. The red gates denote the correct assignment
Fig. 10.3The illustration of how the CamoSecCheck generates its output from the CamoSecGenblock and Camo Input Mapping block
The CamoPerturb method is significant because the attacker will not be able to distinguish multiple incorrect inputs from a single DI. This is due to the CamoPerturb blockâs output going high only when the camouflaged input matches the camouflaged secret. Furthermore, because one DI can only reveal one unique set of incorrect inputs, the number of DIs required cannot be reduced. The number of DIs possibly needed is the same as the number of possible inputs, which is 2kâââ1, where k is the number of inputs. This complexity is desirable in a camouflaging technique and distinguishes it from other currently used techniques.
CamoPerturbâs effectiveness is demonstrated in [17] and compared to more traditional camouflaging techniques such as Clique-Based Selection (CBS). When both CamoPerturb and CBS are applied to the same circuit, CamoPerturb requires 2kâââ1 DIs to decrypt, whereas CBS can be broken relatively easily with DIââ¤â10. CBS camouflaging usually takes less than a second to solve due to the low number of DIs required. On the contrary, as the number of CamoPerturb possible DIs grows exponentially, so does the time it takes to execute the attack. In addition to the improved complexity that CamoPerturb provides, it has lower delay than other techniques. Since it needs to create two sets of camouflaged blocks in CamoPerturb, CamoFix, and Cpert, it has a higher area requirement. Table 10.1 summarizes the metrics of multiple camouflaging techniques. Table 10.1The table compares multiple camouflaging techniques across different key metrics
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7582)
Robo-Advisor with Python by Aki Ranin(7471)
Offensive Shellcode from Scratch by Rishalin Pillay(6032)
Ego Is the Enemy by Ryan Holiday(4924)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4870)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4431)
Python for ArcGIS Pro by Silas Toms Bill Parker(4106)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3810)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3528)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3275)
Speed Up Your Python with Rust by Maxwell Flitton(3225)
Liar's Poker by Michael Lewis(3205)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3187)
Extreme DAX by Michiel Rozema & Henk Vlootman(3164)
Agile Security Operations by Hinne Hettema(3114)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3105)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3080)
Cryptography Algorithms by Massimo Bertaccini(2998)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2975)
