Securing Computer Hardware on the Base of Reference Monitor Obfuscation
- 1 October 2018
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)
Abstract
Widespread outsourcing of integrated circuits fabrication increases the vulnerability to security threats. In this paper, we address approach that incorporates hardware design obfuscation scheme to protect a design against various forms of attacks. Hardware obfuscation is a technique by which an integrated circuit is modified to intentionally conceal its functionality and schematic. We consider hardware security through the reference monitor obfuscation. We obscure the connectivity of reference monitor so that an attacker cannot gain its functionality and original structure.Keywords
This publication has 6 references indexed in Scilit:
- DSP design protection in CE through algorithmic transformation based structural obfuscationIEEE Transactions on Consumer Electronics, 2017
- Hardware Protection through ObfuscationPublished by Springer Science and Business Media LLC ,2017
- A survey of hardware Trojan threat and defenseIntegration, 2016
- Hardware security: Threat models and metricsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Hardware Trojan: Threats and emerging solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- The Reference Monitor Concept as a Unifying Principle in Computer Security EducationPublished by Defense Technical Information Center (DTIC) ,1999