"Glitch Logic" and Applications to Computing and Information Security

被引:0
|
作者
Stoica, Adrian [1 ]
Katkoori, Srinivas [2 ]
机构
[1] CALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USA
[2] Univ S Florida, CSE Dpt, Tampa, FL USA
来源
2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009) | 2009年
关键词
anti-tamper; trusted design; protection to reverse engineering; information exfiltration; stego-design; hardware vulnerabilities;
D O I
10.1109/BLISS.2009.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information inflltration/exfiltration and propagation of viruses/spyware/Trojan horses.
引用
收藏
页码:107 / +
页数:2
相关论文
共 50 条
  • [11] Serverless Computing Security: Protecting Application Logic
    O'Meara, Wesley
    Lennon, Ruth G.
    2020 31ST IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2020, : 142 - 146
  • [12] LOGIC INFORMATION-COMPUTING SYSTEMS
    FINN, VK
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 2-INFORMATSIONNYE PROTSESSY I SISTEMY, 1986, (01): : 7 - 10
  • [13] Fuzzy Logic, Soft Computing, and Applications
    Cabrera, Inma P.
    Cordero, Pablo
    Ojeda-Aciego, Manuel
    BIO-INSPIRED SYSTEMS: COMPUTATIONAL AND AMBIENT INTELLIGENCE, PT 1, 2009, 5517 : 236 - 244
  • [14] Analysis of cloud computing and information security
    Kenan, Wang
    Shao, Qian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3810 - 3813
  • [15] A Survey on Information Security in Cloud Computing
    Orantes Jimenez, Sandra Dinora
    Aguirre Anaya, Eleazar
    COMPUTACION Y SISTEMAS, 2020, 24 (02): : 819 - 833
  • [16] Information Security in the Era of "Cloud Computing"
    An, Jing
    Zhang, Lei
    You, Chunlan
    Li, Xuehu
    2017 2ND ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2017), 2017, 78 : 81 - 84
  • [17] Quantum computing and security of information systems
    Berezin, A. A.
    SAFETY AND SECURITY ENGINEERING II, 2007, 94 : 149 - 159
  • [18] Bluetooth Security in Wearable Computing Applications
    Bouhenguel, Redjem
    Mahgoub, Imad
    Ilyas, Mohammad
    2008 INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES, 2008, : 168 - 172
  • [19] Security games for service computing applications
    Ye, Xinfeng
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2015, 30 (06): : 461 - 472
  • [20] Teaching Mathematical Logic for Information Security Specialty
    Li Zhi-min
    Chen Jian-xin
    Lu Jun
    Ye Cong-huan
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 405 - 408