مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

75
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

40
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

An Obfuscation Method Based on CFGLUTs for Security of FPGAs

Pages

  157-162

Keywords

Configurable Look Up Tables (CFGLUTs) 
Hardware Trojan Horses (HTHs) 

Abstract

 There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is Obfuscation methods. In this paper, we proposed an approach based on Obfuscation to prevent FPGAs from successful reverse engineering and, as a result, hardware trojan horses (HTHs) insertion. Our Obfuscation method is using configurable look up tables (CFGLUTs). We suggest to insert CFGLUTs randomly or based on some optional parameters in the design. In this way, some parts of the design are on a secure memory, which contains the bitstream of the CFGLUTs so that the attacker does not have any access to it. We program the CFGLUTs in run-time to complete the bitstream of the FPGA and functionality of the design. If an attacker can reverse engineer the bitstream of the FPGA, he cannot detect the design because some part of it is composed of CFGLUTs, which their bitstream is on a secure memory. The first article uses CFGLUTs for securing FPGAs against HTHs insertion, which are results of reverse engineering. Our methods do not have any power and hardware overhead but 32 clock cycles time overhead.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Labafniya, Mansoureh, & Etemadi Borujeni, Shahram. (2021). An Obfuscation Method Based on CFGLUTs for Security of FPGAs. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 13(2), 157-162. SID. https://sid.ir/paper/973916/en

    Vancouver: Copy

    Labafniya Mansoureh, Etemadi Borujeni Shahram. An Obfuscation Method Based on CFGLUTs for Security of FPGAs. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2021;13(2):157-162. Available from: https://sid.ir/paper/973916/en

    IEEE: Copy

    Mansoureh Labafniya, and Shahram Etemadi Borujeni, “An Obfuscation Method Based on CFGLUTs for Security of FPGAs,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 13, no. 2, pp. 157–162, 2021, [Online]. Available: https://sid.ir/paper/973916/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button