Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2179298.2179376acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Deterministic circuit variation for anti-tamper applications

Published: 12 October 2011 Publication History
First page of PDF

Supplementary Material

Supplemental material. (a68-mcdonald_slide.pdf)

References

[1]
Goldwasser, S. and Rothblum, G. On best-possible obfuscation. LNCS, Vol. 4392, TCC 2007, Springer-Verlag, 2007, 194-213.
[2]
Kim, Y. and McDonald J. Considering Software Protection for Embedded Systems. Crosstalk, 22, 6 (Sep/Oct 2009), 4-8.
[3]
McDonald J., Kim Y., and Yasinsac A. Software issues in digital forensics. ACM Operating Systems Review, 42, 3 (April 2008).
[4]
McDonald J., Kim Y., and Grimaila, M. Protecting Reprogrammable Hardware with Polymorphic Circuit Variation. In Proc. of the 2nd Cyber Research Wrkshp (June 2009), Shreveport, LA.
[5]
McDonald J., Trias, E., et al. Using Logic-Based Reduction for Adversarial Component Recovery. In Proc. of the 25th ACM SAC (March 2010), Sierre, Switzerland,
[6]
Yasinsac, A. and McDonald, J. Of unicorns and random programs. In Proc. of 3rd IASTED CCN (2005), Marina, CA.
[7]
Hansen, M., Yalcin, H., and Hayes, J. Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering. IEEE Design & Test of Computers, 16, 3 (1999), 72-80.
[8]
Parham J., Kim Y., et al. Hiding Circuit Components Using Boundary Blurring Techniques. In Proc. of IEEE Annual Symposium on VLSI (Jul. 5-7, 2010), Cephalonia, Greece.
[9]
White J., Wojcik, A., et al., Candidate sub-circuits for functional module identification in logic circuits," Proc. of the 10th Great Lakes Symposium on VLSI (2000), Chicago, IL, 34-38.

Cited By

View all
  • (2024)The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00027(361-380)Online publication date: 8-Jul-2024
  • (2019)Toward a Formal and Quantitative Evaluation Framework for Circuit Obfuscation MethodsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.286422038:10(1844-1857)Online publication date: Oct-2019
  • (2018)Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random EncodingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2018.284418026:10(2007-2015)Online publication date: Oct-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
October 2011
18 pages
ISBN:9781450309455
DOI:10.1145/2179298
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Eurosis: Eurosis
  • Oak Ridge National Laboratory
  • University of Tennessee: University of Tennessee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '11
Sponsor:
  • Eurosis
  • University of Tennessee

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00027(361-380)Online publication date: 8-Jul-2024
  • (2019)Toward a Formal and Quantitative Evaluation Framework for Circuit Obfuscation MethodsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.286422038:10(1844-1857)Online publication date: Oct-2019
  • (2018)Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random EncodingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2018.284418026:10(2007-2015)Online publication date: Oct-2018
  • (2018)Enhancing Security Against Software Attacks with Reprogrammable Hardware2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00049(258-266)Online publication date: Apr-2018
  • (2017)Circuit Obfuscation and Oracle-guided AttacksProceedings of the Great Lakes Symposium on VLSI 201710.1145/3060403.3060494(357-362)Online publication date: 10-May-2017
  • (2017)Enhanced Operating System Protection to Support Digital Forensic Investigations2017 IEEE Trustcom/BigDataSE/ICESS10.1109/Trustcom/BigDataSE/ICESS.2017.296(650-659)Online publication date: Aug-2017
  • (2017)Physical Design Obfuscation of HardwareIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.260106712:1(64-77)Online publication date: 1-Jan-2017
  • (2014)Intellectual Property Protection in Additive Layer ManufacturingProceedings of the 4th Program Protection and Reverse Engineering Workshop10.1145/2689702.2689709(1-9)Online publication date: 9-Dec-2014
  • (2014)Software Security and Randomization through Program Partitioning and Circuit VariationProceedings of the First ACM Workshop on Moving Target Defense10.1145/2663474.2663484(79-86)Online publication date: 7-Nov-2014
  • (2012)Evaluating component hiding techniques in circuit topologies2012 IEEE International Conference on Communications (ICC)10.1109/ICC.2012.6364542(1138-1143)Online publication date: Jun-2012

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media