"Glitch Logic" and Applications to Computing and Information Security
被引:0
作者:
Stoica, Adrian
论文数: 0引用数: 0
h-index: 0
机构:
CALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USACALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USA
Stoica, Adrian
[1
]
Katkoori, Srinivas
论文数: 0引用数: 0
h-index: 0
机构:
Univ S Florida, CSE Dpt, Tampa, FL USACALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USA
Katkoori, Srinivas
[2
]
机构:
[1] CALTECH, Jet Prop Lab, 4800 Oak Grove Dr, Pasadena, CA 91109 USA
[2] Univ S Florida, CSE Dpt, Tampa, FL USA
来源:
2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009)
|
2009年
关键词:
anti-tamper;
trusted design;
protection to reverse engineering;
information exfiltration;
stego-design;
hardware vulnerabilities;
D O I:
10.1109/BLISS.2009.1
中图分类号:
TP18 [人工智能理论];
学科分类号:
081104 ;
0812 ;
0835 ;
1405 ;
摘要:
This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information inflltration/exfiltration and propagation of viruses/spyware/Trojan horses.