11 research outputs found

    The basic primitives of digital circuit obfuscation

    Get PDF
    Features of obfuscation as applied to specifications in VHDL language are considered. Brief survey of obfuscation types is given and their drawbacks are investigated. Circuit obfuscation methods are considered. Basic primitives of circuit obfuscation are proposed and ways of their usage are explored

    The basic primitives of digital circuit obfuscation

    Get PDF
    Features of obfuscation as applied to specifications in VHDL language are considered. Brief survey of obfuscation types is given and their drawbacks are investigated. Circuit obfuscation methods are considered. Basic primitives of circuit obfuscation are proposed and ways of their usage are explored

    ОСОБЕННОСТИ ОБФУСКАЦИИ VHDL-ОПИСАНИЙ И МЕТОДЫ ОЦЕНКИ ЕЕ СЛОЖНОСТИ

    Get PDF
    Lexical and functional obfuscation is formalized. Brief survey of methods of lexical obfuscation is given and their drawbacks are investigated when applied to specifications in VHDL language. Complexity evaluation methods for specifications in VHDL language are considered. Complexity evaluation for different variants of VHDL specifications of a given digital device is presented.Формализуется лексическая и функциональная обфускация. Обфускация – совокупность ме-тодик и средств, направленных на затруднение анализа исходных кодов программ. Дается краткий обзор способов лексической обфускации и изучаются их недостатки применительно к описаниям на языке VHDL. Рассматриваются методы оценки сложности описаний на языке VHDL. Приводится оценка сложности для различных вариантов VHDL-описаний одного цифрового устройства

    ОБЗОР МЕТОДОВ РЕАЛИЗАЦИИ АППАРАТНЫХ ВОДЯНЫХ ЗНАКОВ В ЦИФРОВЫХ УСТРОЙСТВАХ ПРОГРАММИРУЕМОЙ ЛОГИКИ

    Get PDF
    Application of watermarking technology for the protection of digital devices and their descriptionsis considered. Primary definitions, models, categories of attacks, characteristics and classificationof watermarks are described. Hardware watermarking examples are shown.Рассматривается применение технологии водяных знаков для защиты цифровых устройств и их проектных описаний. Приводятся основные определения, модели, категории атак, характеристики, классификация водяных знаков для данной области. Описываются примеры использования аппаратных водяных знаков

    Digital Watermark and Fingerprint in Variable Rank Linear-Feedback Shift Register

    No full text
    This paper presents new watermarking approach for hardware IP-core (Intellectual Property core) protection. The approach operates in BIST’s (Built-In Self-Test) test pattern generation circuit—Variable Rank Linear-Feedback Shift Register (VR-LFSR), therefore it has wide application area. Theoretical part surveys related work, outlines the approach, studies attack resilience and probability of coincidence. Experimental part explores hardware implementations and their overheads. Fingerprinting approach, which can be used simultaneously with watermarking, is presented

    A SURVEY OF HARDWARE WATERMARKING FOR PROGRAMMABLE LOGIC DEVICES PROTECTION

    No full text
    Application of watermarking technology for the protection of digital devices and their descriptionsis considered. Primary definitions, models, categories of attacks, characteristics and classificationof watermarks are described. Hardware watermarking examples are shown

    FEATURES OF OBFUSCATION OF VHDL-DESIGNS AND ITS COMPLEXITY EVALUATION METHODS

    No full text
    Lexical and functional obfuscation is formalized. Brief survey of methods of lexical obfuscation is given and their drawbacks are investigated when applied to specifications in VHDL language. Complexity evaluation methods for specifications in VHDL language are considered. Complexity evaluation for different variants of VHDL specifications of a given digital device is presented

    Obfuscation and watermarking of FPGA designs based on constant value generators

    No full text
    Obfuscation is a technique which makes design less intelligible in order to prevent or increase reverse engineering effort. In this paper, a new approach to hardware obfuscation by inserting constant value generators (CVGs) is proposed. A CVG is a circuit that generates the same fixed logic value but will not be minimized by the synthesizer. CVGs can be used to create new logic primitives, embed watermarks and introduce fictive interdependencies in the circuit. They help to hide actual design performance information by tricking the synthesizer tools to generate deceiving delay reports through the false paths.Accepted versio
    corecore