• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track
 
  • Details
  • Full
Options
January 1, 2024
Conference Paper
Title

Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track

Abstract
Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when protecting designs against RE attacks. While most recent protection techniques rely on the security of a secret key, this work presents a new approach: hardware FSM honeypots. These honeypots lead the RE tools to a wrong but, for the tools, very attractive FSM, while making the original FSM less attractive. The results show that state-of-the-art RE methods favor the highly attractive honeypot as FSM candidate or do no longer detect the correct, original FSM.
Author(s)
Brunner, Michaela
Ludwig-Maximilians-Universität München
Lee, Hye Hyun
Ludwig-Maximilians-Universität München
Hepp, Alexander
Ludwig-Maximilians-Universität München
Baehr, Johanna
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Sigl, Georg  
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Mainwork
27th International Symposium on Design and Diagnostics of Electronic Circuits & Systems, DDECS 2024. Proceedings  
Conference
International Symposium on Design & Diagnostics of Electronic Circuits & Systems 2024  
Open Access
DOI
10.1109/DDECS60919.2024.10508924
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • IC trust

  • netlist reverse engineering

  • state machine obfuscation

  • honeypot

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024