"Glitch Logic" and Applications to Computing and Information Security

被引:0
|
作者
Stoica, Adrian [1 ]
Katkoori, Srinivas [2 ]
机构
[1] CALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USA
[2] Univ S Florida, CSE Dpt, Tampa, FL USA
来源
2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009) | 2009年
关键词
anti-tamper; trusted design; protection to reverse engineering; information exfiltration; stego-design; hardware vulnerabilities;
D O I
10.1109/BLISS.2009.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information inflltration/exfiltration and propagation of viruses/spyware/Trojan horses.
引用
收藏
页码:107 / +
页数:2
相关论文
共 50 条
  • [1] Neuro-Computing Applications in Security of Network Information Systems
    Yao Min(DepartmeNt of Computer
    Journal of Systems Engineering and Electronics, 1999, (02) : 65 - 68
  • [2] Peptide-Based Sensing, Logic Computing, and Information Security on the Antimonene Platform
    Bu, Zhen Qi
    Yao, Qing Feng
    Liu, Qing Yu
    Quan, Min Xia
    Lu, Jiao Yang
    Huang, Wei Tao
    ACS APPLIED MATERIALS & INTERFACES, 2022, 14 (06) : 8311 - 8321
  • [3] Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention
    Huang G.
    Xu X.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [4] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [5] Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing
    Chuan Qin
    Weiming Zhang
    Xinpeng Zhang
    Multimedia Tools and Applications, 2018, 77 : 17853 - 17859
  • [6] Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing
    Qin, Chuan
    Zhang, Weiming
    Zhang, Xinpeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 17853 - 17859
  • [7] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [8] LOGIC ENGINEERING WITH APPLICATIONS TO SECURITY
    Masalagiu, Cristian-Dumitru
    Alaib, Vasile
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 141 - 148
  • [9] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    中国通信, 2013, 10 (11) : 11 - 12
  • [10] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    CRYPTOLOGIA, 2009, 33 (03) : 217 - 245