11 research outputs found
The basic primitives of digital circuit obfuscation
Features of obfuscation as applied to specifications in VHDL language are considered. Brief survey of obfuscation types is given and their drawbacks are investigated. Circuit obfuscation methods are considered. Basic primitives of circuit obfuscation are proposed and ways of their usage are explored
The basic primitives of digital circuit obfuscation
Features of obfuscation as applied to specifications in VHDL language are considered. Brief survey of obfuscation types is given and their drawbacks are investigated. Circuit obfuscation methods are considered. Basic primitives of circuit obfuscation are proposed and ways of their usage are explored
ОСОБЕННОСТИ ОБФУСКАЦИИ VHDL-ОПИСАНИЙ И МЕТОДЫ ОЦЕНКИ ЕЕ СЛОЖНОСТИ
Lexical and functional obfuscation is formalized. Brief survey of methods of lexical obfuscation is given and their drawbacks are investigated when applied to specifications in VHDL language. Complexity evaluation methods for specifications in VHDL language are considered. Complexity evaluation for different variants of VHDL specifications of a given digital device is presented.Формализуется лексическая и функциональная обфускация. Обфускация – совокупность ме-тодик и средств, направленных на затруднение анализа исходных кодов программ. Дается краткий обзор способов лексической обфускации и изучаются их недостатки применительно к описаниям на языке VHDL. Рассматриваются методы оценки сложности описаний на языке VHDL. Приводится оценка сложности для различных вариантов VHDL-описаний одного цифрового устройства
ОБЗОР МЕТОДОВ РЕАЛИЗАЦИИ АППАРАТНЫХ ВОДЯНЫХ ЗНАКОВ В ЦИФРОВЫХ УСТРОЙСТВАХ ПРОГРАММИРУЕМОЙ ЛОГИКИ
Application of watermarking technology for the protection of digital devices and their descriptionsis considered. Primary definitions, models, categories of attacks, characteristics and classificationof watermarks are described. Hardware watermarking examples are shown.Рассматривается применение технологии водяных знаков для защиты цифровых устройств и их проектных описаний. Приводятся основные определения, модели, категории атак, характеристики, классификация водяных знаков для данной области. Описываются примеры использования аппаратных водяных знаков
Digital Watermark and Fingerprint in Variable Rank Linear-Feedback Shift Register
This paper presents new watermarking approach for hardware IP-core (Intellectual Property core) protection. The approach operates in BIST’s (Built-In Self-Test) test pattern generation circuit—Variable Rank Linear-Feedback Shift Register (VR-LFSR), therefore it has wide application area. Theoretical part surveys related work, outlines the approach, studies attack resilience and probability of coincidence. Experimental part explores hardware implementations and their overheads. Fingerprinting approach, which can be used simultaneously with watermarking, is presented
A SURVEY OF HARDWARE WATERMARKING FOR PROGRAMMABLE LOGIC DEVICES PROTECTION
Application of watermarking technology for the protection of digital devices and their descriptionsis considered. Primary definitions, models, categories of attacks, characteristics and classificationof watermarks are described. Hardware watermarking examples are shown
FEATURES OF OBFUSCATION OF VHDL-DESIGNS AND ITS COMPLEXITY EVALUATION METHODS
Lexical and functional obfuscation is formalized. Brief survey of methods of lexical obfuscation is given and their drawbacks are investigated when applied to specifications in VHDL language. Complexity evaluation methods for specifications in VHDL language are considered. Complexity evaluation for different variants of VHDL specifications of a given digital device is presented
Obfuscation and watermarking of FPGA designs based on constant value generators
Obfuscation is a technique which makes design less intelligible in order to prevent or increase reverse engineering effort. In this paper, a new approach to hardware obfuscation by inserting constant value generators (CVGs) is proposed. A CVG is a circuit that generates the same fixed logic value but will not be minimized by the synthesizer. CVGs can be used to create new logic primitives, embed watermarks and introduce fictive interdependencies in the circuit. They help to hide actual design performance information by tricking the synthesizer tools to generate deceiving delay reports through the false paths.Accepted versio