Hardware Security Primitives by Mark Tehranipoor & Nitin Pundir & Nidish Vashistha & Farimah Farahmandi

Hardware Security Primitives by Mark Tehranipoor & Nitin Pundir & Nidish Vashistha & Farimah Farahmandi

Author:Mark Tehranipoor & Nitin Pundir & Nidish Vashistha & Farimah Farahmandi
Language: eng
Format: epub
ISBN: 9783031191855
Publisher: Springer International Publishing


Fig. 10.2(a) The illustration of CamoSecGen block’s layout with four camouflaged inverter/buffers that generate the secret code. (b) Illustration of Camo Input Mapping block consisting of four camouflaged inverters/buffers to hide the transformations. The red gates denote the correct assignment

Fig. 10.3The illustration of how the CamoSecCheck generates its output from the CamoSecGenblock and Camo Input Mapping block

The CamoPerturb method is significant because the attacker will not be able to distinguish multiple incorrect inputs from a single DI. This is due to the CamoPerturb block’s output going high only when the camouflaged input matches the camouflaged secret. Furthermore, because one DI can only reveal one unique set of incorrect inputs, the number of DIs required cannot be reduced. The number of DIs possibly needed is the same as the number of possible inputs, which is 2k − 1, where k is the number of inputs. This complexity is desirable in a camouflaging technique and distinguishes it from other currently used techniques.

CamoPerturb’s effectiveness is demonstrated in [17] and compared to more traditional camouflaging techniques such as Clique-Based Selection (CBS). When both CamoPerturb and CBS are applied to the same circuit, CamoPerturb requires 2k − 1 DIs to decrypt, whereas CBS can be broken relatively easily with DI ≤ 10. CBS camouflaging usually takes less than a second to solve due to the low number of DIs required. On the contrary, as the number of CamoPerturb possible DIs grows exponentially, so does the time it takes to execute the attack. In addition to the improved complexity that CamoPerturb provides, it has lower delay than other techniques. Since it needs to create two sets of camouflaged blocks in CamoPerturb, CamoFix, and Cpert, it has a higher area requirement. Table 10.1 summarizes the metrics of multiple camouflaging techniques. Table 10.1The table compares multiple camouflaging techniques across different key metrics



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.