EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering

04/20/2019
by   Zimu Guo, et al.
0

PCBs are the core components for the devices ranging from the consumer electronics to military applications. Due to the accessibility of the PCBs, they are vulnerable to the attacks such as probing, eavesdropping, and reverse engineering. In this paper, a solution named EOP is proposed to migrate these threats. EOP encrypts the inter-chip communications with the stream cipher. The encryption and decryption are driven by the dedicated clock modules. These modules guarantee the stream cipher is correctly synchronized and free from tampering. Additionally, EOP also incorporates the PCB-level obfuscation for protection against reverse engineering. EOP is designated to be accomplished by utilizing the COTS components. For the validation, EOP is implemented in a Zynq SoC based system. Both the normal operation and tampering detection performance are verified. The results show that EOP can deliver the data from one chip to another without any errors. It is proved to be sensitive to any active tampering attacks.

READ FULL TEXT

page 1

page 4

page 8

page 10

research
05/05/2023

Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track

Reverse engineering of finite state machines is a serious threat when pr...
research
10/27/2022

Rethinking the Reverse-engineering of Trojan Triggers

Deep Neural Networks are vulnerable to Trojan (or backdoor) attacks. Rev...
research
02/23/2020

SNIFF: Reverse Engineering of Neural Networks with Fault Attacks

Neural networks have been shown to be vulnerable against fault injection...
research
07/11/2023

ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks

Modern System-on-Chip designs typically use Network-on-Chip (NoC) fabric...
research
12/10/2021

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation

Modern mobile devices feature multiple wireless technologies, such as Bl...
research
05/19/2022

Obfuscating the Hierarchy of a Digital IP

Numerous security threats are emerging from untrusted players in the int...
research
07/02/2019

Extended Report on the Obfuscated Integration of Software Protections

To counter man-at-the-end attacks such as reverse engineering and tamper...

Please sign up or login with your details

Forgot password? Click here to reset