Protecting circuitry from reverse engineering is extremely important for critical technologies. When systems designed for security become compromised, millions of dollars and countless labor hours may be required for redesigning new protection circuitry. Similarly, an organization using reverse engineering techniques for reproducing systems can do so with significantly lower costs. Component identification is an essential step to reverse engineering. Techniques which increase the necessary time for discovering circuit components, and in turn delay or even defeat component identification, increase the level of circuit protection against reverse engineering and other adversarial attacks. In this paper, we discuss our Java based component identification tool implementation. We also introduce two component hiding algorithms and show they effectively defeat component identification.
[1]
John P. Hayes,et al.
Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering
,
1999,
IEEE Des. Test Comput..
[2]
Anthony S. Wojcik,et al.
Candidate subcircuit enumeration for module identification in digital circuits
,
2000
.
[3]
David Evans,et al.
Reverse-Engineering a Cryptographic RFID Tag
,
2008,
USENIX Security Symposium.
[4]
Moon-Jung Chung,et al.
Candidate subcircuits for functional module identification in logic circuits
,
2000,
ACM Great Lakes Symposium on VLSI.
[5]
I. Xilinx,et al.
Virtex-II Pro and Virtex-II Pro X Platform FPGAs: Complete data sheet
,
2004
.