期刊文献+

基于状态映射的AES算法硬件混淆设计 被引量:4

Design of Hardware Obfuscation AES Based on State Deflection Strategy
下载PDF
导出
摘要 代码混淆利用系统自身逻辑来保护内部重要信息和关键算法,常用于软件代码的安全防护,确保开发者和用户的利益。如何在硬件电路上实现混淆、保护硬件IP核的知识产权,也是亟待解决的问题。该文通过对硬件混淆和AES算法的研究,提出一种基于状态映射的AES算法硬件混淆方案。该方案首先利用冗余和黑洞两种状态相结合的状态映射方式,实现有限状态机的混淆;然后,采用比特翻转的方法,实现组合逻辑电路的混淆;最后,在SMIC 65 nm CMOS工艺下设计基于状态映射的AES算法硬件混淆电路,并采用Toggle、数据相关性和代码覆盖率等评价硬件混淆的效率和有效性。实验结果表明,基于状态映射的AES算法硬件混淆电路面积和功耗分别增加9%和16%,代码覆盖率达到93%以上。 Obfuscation is used to safeguard lawful rights and interests of developers and users in software security, by protecting critical information and algorithms with the system logic relation. Also, how to achieve obfuscation method to protect the hardware IP core is becoming an urgent problem. In this paper, a hardware obfuscation scheme based on deflection strategy is proposed by studying the obfuscation method and the AES algorithm. The deflection strategy with redundancy and black hole states are used to realize the Finite State Machine(FSM) obfuscation, and the bit flip method is used to realize the combinational logic obfuscation. Finally, the proposed hardware obfuscation AES algorithm is designed in SMIC 65 nm CMOS process. The parameters of toggle, data correlation and code coverage are selected to evaluate the efficiency and effectiveness of hardware confusion. Experimental results show that the area and power consumption of the hardware obfuscation AES algorithm is increased by 9% and 16% respectively, and the code coverage rate is over 93%.
出处 《电子与信息学报》 EI CSCD 北大核心 2018年第3期750-757,共8页 Journal of Electronics & Information Technology
基金 浙江省自然科学基金(LY18F040002) 国家自然科学基金(61404076 61474068) 浙江省公益项目(2015C31010 2016C 31078) 宁波市自然科学基金(2014A610148 2015A610107) 王宽诚幸福基金~~
关键词 状态映射 代码混淆 AES算法 逆向工程 IP核安全 State deflection Hardware obfuscation AES algorithm Reverse engineering IP security
  • 相关文献

参考文献3

二级参考文献42

  • 1高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 2Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 3Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 4Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 5Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].
  • 6Barak B,Goldreich O,Impagliazzo R,Rudich S,Sahai A,Vadhan SP,Yang K.On the(im)possibility of obfuscating programs.In:Kilian J,ed.Proc.of the 21st Annual Int’l Cryptology Conf.on Advances in Cryptology(CRYPTO 2001).Santa Barbara:Springer-Verlag,2001.1-18.
  • 7Appel A.Deobfuscation is in NP.2002.http://www.cs.princeton.edu/~appel/papers/deobfus.pdf.
  • 8Preda M,Giacobazzi R.Semantic-Based code obfuscation by abstract interpretation.In:Proc.of the ICALP.2005.[doi:10.1007/11523468_107].
  • 9Preda M,Giacobazzi R.Control code obfuscation by abstract interpretation.In:Proc.of the SEFM.2005.[doi:10.1109/SEFM.2005.13].
  • 10Gao Y,Chen YY.Research on code obfuscation and its semantics[Ph.D.Thesis].Hefei:University of Science and Technology ofChina,2007.(in Chinese with English abstract).

共引文献34

同被引文献24

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部