Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track

Michaela Brunner, Hye Hyun Lee, Alexander Hepp, Johanna Baehr, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when protecting designs against RE attacks. While most recent protection techniques rely on the security of a secret key, this work presents a new approach: hardware FSM honeypots. These honeypots lead the RE tools to a wrong but, for the tools, very attractive FSM, while making the original FSM less attractive. The results show that state-of-the-art RE methods favor the highly attractive honeypot as FSM candidate or do no longer detect the correct, original FSM.

Original languageEnglish
Title of host publicationProceedings - 2024 27th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2024
EditorsStanislaw Deniziak, Pawel Sitek, Maksim Jenihhin, Andreas Steininger, Mario Scholzel, Vojtech Mrazek
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages47-52
Number of pages6
ISBN (Electronic)9798350359343
DOIs
StatePublished - 2024
Externally publishedYes
Event27th International Symposium on Design and Diagnostics of Electronic Circuits and Sytems, DDECS 2024 - Kielce, Poland
Duration: 3 Apr 20245 Apr 2024

Publication series

NameProceedings - 2024 27th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2024

Conference

Conference27th International Symposium on Design and Diagnostics of Electronic Circuits and Sytems, DDECS 2024
Country/TerritoryPoland
CityKielce
Period3/04/245/04/24

Keywords

  • IC trust
  • honeypot
  • netlist re-verse engineering
  • state machine obfuscation

Fingerprint

Dive into the research topics of 'Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track'. Together they form a unique fingerprint.

Cite this