Publication Type : Conference Proceedings
Publisher : Institute of Electrical and Electronics Engineers Inc.
Source : 4th IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2017, Institute of Electrical and Electronics Engineers Inc., Volume 2017-January, p.200-204 (2018)
Keywords : Bit sequences, Built-in-hardware, Computation theory, Hardware, hardware security, Network security, Number theory, PRNG, Pseudo random number generators, Random number generation, Reverse engineering, Reverse engineering process, Signal processing, Signature generation, Specific information, TrustedHardware
Campus : Coimbatore
School : School of Engineering
Department : Electronics and Communication
Year : 2018
Abstract : In today's world, as the demand for IC production grows exponentially, testing and validation of all the manufactured chips becomes impossible. Therefore, in the proposed method, we have developed a technique for embedding unique signatures with minimalistic hardware or area overhead while preserving the intended functionality. To achieve this, three 'levels' of security are provided. First, circuit specific information is derived and used for signature generation. Second, the generated signature is hashed, obfuscating the logic reverse engineering process and finally a bit sequence from a Pseudo-Random Number Generator (PRNG) to make it unfeasibly difficult for the attacker to decode the signature
Cite this Research Publication : D. M. Reddy, Akshay, K. P., Giridhar, R., Karan, S. D., and N Mohankumar, “BHARKS: Built-in Hardware Authentication using Random Key Sequence”, 4th IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2017, vol. 2017-January. Institute of Electrical and Electronics Engineers Inc., pp. 200-204, 2018.