Aggregation-based obfuscation method for electronic systems design
DOI:
https://doi.org/10.30837/2522-9818.2024.3.057Keywords:
hardware security; obfuscation of electronic systems design; reference monitor; aggregationAbstract
Hardware Trojan attacks relate to malicious modifications of integrated circuits during design or manufacturing, involving untrusted design tools or components. Such modifications can lead to undesired behavior of integrated circuits or the appearance of hidden data leakage channels. There are various methods of classification, detection and prevention of hardware Trojans insertion. One approach to prevent of Trojans insertion is an obfuscation-based design approach. This approach is based on hiding the functional and structural properties of the design, which makes it difficult for an attacker to insert Trojans. The subject matter of research is an aggregation-based obfuscation method for electronic systems design. The goal of the work is to study the process of aggregation-based obfuscation of the electronic systems design. The main idea is that the development and connection phase of the reference monitor is performed in a trusted environment. Thus, an attacker will not be able to obtain its functionality and original structure. The relevance of the work lies in the fact that this approach prevents the possibility of functioning of hardware Trojans. The following tasks were solved in the work: development and study of an aggregation-based obfuscation algorithm for electronic systems design; implementation of the reference monitor presentation as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method. As a result of the work the aggregation-based obfuscation method for electronic systems design was demonstrated; reference monitor was presented as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method was demonstrated. The studies allow us to conclude: the obfuscation-based design approach is that the integrated circuit is modified, thus, the functional and structural properties of the design are hidden, which makes it difficult for an attacker to insert Trojans. Aggregation-based obfuscation considers the reference monitor as a separate subsystem associated with the main design.
References
Список літератури
Hardware Trojan Attacks: Threat Analysis and Countermeasures / S. Bhunia et al. Proceedings of the IEEE. 2014. Vol. 102. P. 1229–1247. DOI: http://dx.doi.org/10.1109/JPROC.2014.2334493
Chakraborty R. S., Narasimhan S., Bhunia S. Hardware Trojan: Threats and emerging solutions. IEEE International High Level Design Validation and Test Workshop. 2009. P. 166–171. DOI: http://dx.doi.org/10.1109/HLDVT.2009.5340158
Li H., Liu Q., Zhang J. A survey of hardware Trojan threat and defense. Integration. 2016. Vol. 55. P. 426–437. DOI: https://doi.org/10.1016/j.vlsi.2016.01.004
Francq J. Hardware Trojans Detection Methods. Cassidian Cybersecurity, in TRUDEVICE. 2013. P. 36–40.
Saqib F., Plusquellic J. VLSI Test and Hardware Security Background for Hardware Obfuscation. In: Forte D., Bhunia S., Tehranipoor M. Hardware Protection through Obfuscation. Springer. 2017. DOI: https://doi.org/10.1007/978-3-319-49019-9_2
Development and Evaluation of Hardware Obfuscation Benchmarks / S. Amir et al. Journal of Hardware and Systems Security. 2018. Vol. 2. P. 142–161. DOI: https://doi.org/10.1007/s41635-018-0036-3
Schell R. R., Brinkley D. L. Evaluation Criteria for Trusted Systems. In: Abrams M. D., Jajodia S., Podell H. J. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press. 1995. P. 137–159.
Gorbachov V., Batiaa A. K. Overview of security problems and the design of secure electronic systems. Radiotekhnika. 2017. Vol. 4. No. 191. P. 113–119. DOI: https://doi.org/10.30837/rt.2017.4.191.10
Bishop M. Computer Security: art and science. Addison-Wesley. ISBN 0-201-44099-7. 2002.
Anderson J. Computer Security Technology Planning Study. Technical Report ESD-TR-73–51. 1972.
Securing Computer Hardware on the Base of Reference Monitor Obfuscation / V. Gorbachov et al. International Scientific-Practical Conference Problems of Infocommunications. Science and Technology. 2018. P. 406–410. DOI: https://doi.org/10.1109/INFOCOMMST.2018.8632147
Irvine C. E. The Reference Monitor Concept as a Unifying Principle in Computer Security Education. 1999. P. 27–37.
Пономаренко О. Є., Горбачов В. О. Агрегація структурної моделі складних мережних систем. Системи управління, навігації та зв’язку. Збірник наукових праць. 2023. Т. 1. № 71. С. 138–144. DOI: https://doi.org/10.26906/SUNZ.2023.1.138
Dimension Reduction for Network Systems Using Structure Model Aggregation / V. Gorbachov et al. International Journal of Design & Nature and Ecodynamics. 2020. Vol. 15. No. 1. P. 13–23. DOI: https://doi.org/10.18280/ijdne.150103
Formal transformations of structural models of complex network systems / V. Gorbachov et al. Proceedings of the IEEE 9th International Conference on Dependable Systems, Services and Technologies DESSERT’2018. Kyiv, Ukraine. 2018. P. 473–477. DOI: https://doi.org/10.1109/DESSERT.2018.8409175
References
Bhunia, S., Hsiao, M. S., Banga, M., Narasimhan, S. (2014), "Hardware Trojan Attacks: Threat Analysis and Countermeasures", Proceedings of the IEEE, Vol. 102, P. 1229–1247. DOI: http://dx.doi.org/10.1109/JPROC.2014.2334493
Chakraborty, R. S., Narasimhan, S., Bhunia, S. (2009), "Hardware Trojan: Threats and emerging solutions", IEEE International High Level Design Validation and Test Workshop, P. 166–171. DOI: http://dx.doi.org/10.1109/HLDVT.2009.5340158
Li, H., Liu, Q., Zhang, J. (2016), "A survey of hardware Trojan threat and defense", Integration, Vol. 55, P. 426–437. DOI: https://doi.org/10.1016/j.vlsi.2016.01.004
Francq, J. (2013), "Hardware Trojans Detection Methods", Cassidian Cybersecurity , in TRUDEVICE, P. 36–40.
Saqib, F., Plusquellic, J. (2017), "VLSI Test and Hardware Security Background for Hardware Obfuscation", In: Forte, D., Bhunia, S., Tehranipoor, M. "Hardware Protection through Obfuscation. Springer". DOI: https://doi.org/10.1007/978-3-319-49019-9_2
Amir, S., Shakya, B., Xu, X., Jin, Y., Bhunia, S., Tehranipoor, M. M., Forte, D. (2018), "Development and Evaluation of Hardware Obfuscation Benchmarks", Journal of Hardware and Systems Security, Vol. 2, P. 142–161. DOI: https://doi.org/10.1007/s41635-018-0036-3
Schell, R. R., Brinkley, D. L. (1995), "Evaluation Criteria for Trusted Systems", In: Abrams, M. D., Jajodia, S., Podell, H. J., "Information Security: An Integrated Collection of Essays", IEEE Computer Society Press, P. 137–159.
Gorbachov, V., Batiaa, A. K. (2017), "Overview of security problems and the design of secure electronic systems", Radiotekhnika, Vol. 4, No. 191, P. 113–119. DOI: https://doi.org/10.30837/rt.2017.4.191.10
Bishop, M. (2002), Computer Security: art and science, Addison-Wesley. ISBN 0-201-44099-7.
Anderson, J. (1972), "Computer Security Technology Planning Study", Technical Report ESD-TR-73–51.
Gorbachov, V., Batiaa, A. K., Ponomarenko, O., Kulak, E. (2018), "Securing Computer Hardware on the Base of Reference Monitor Obfuscation", International Scientific-Practical Conference Problems of Infocommunications. Science and Technology, P. 406–410. DOI: 10.1109/INFOCOMMST.2018.8632147
Irvine, C. E. (1999), "The Reference Monitor Concept as a Unifying Principle in Computer Security Education", P. 27–37.
Ponomarenko, O., Gorbachov, V. (2023), "Aggregation of structural model of complex network systems", Control, Navigation and Communication Systems. Academic Journal, Vol. 1 (71), P. 138–144. DOI: https://doi.org/10.26906/SUNZ.2023.1.138
Gorbachov, V., Sytnikov, D., Ryabov, O., Batiaa, A. K., Ponomarenko, O. (2020), "Dimension Reduction for Network Systems Using Structure Model Aggregation", International Journal of Design & Nature and Ecodynamics, Vol. 15, No. 1, P. 13–23. DOI: https://doi.org/10.18280/ijdne.150103
Gorbachov, V., Batiaa, A. K., Ponomarenko, O., Romanenkov, Y. (2018), "Formal transformations of stuctural models of complex network systems", Proceedings of the IEEE 9th International Conference on Dependable Systems, Services and Technologies DESSERT’2018, Kyiv, Ukraine, P. 473–477. DOI: https://doi.org/10.1109/DESSERT.2018.8409175
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.