Uncategorized

The entropy asset

Describe the “Assets” that can be found in a SoC. 1. How can the entropy asset be exploited? 2. How can a scan-based attack be performed remotely? Show an example. 3. Explain the differences between semi-invasive and invasive attack. 4. Describe the capabilities of an “Insider” attacker. What kind of attacks can an “Insider” perform?

The entropy asset Read More »

Random number

Random number can be an asset. Remote attackers cannot perform attacks exploiting scan structure. Injecting faults to modify SRAM contents is a semi-invasive attack. Side-channel attacks fall into invasive attack category. Vulnerabilities associated with don’t-care states are introduced in the RTL stage. Vulnerabilities associated with DFT structure are introduced in the gate-level stage.

Random number Read More »

Protecting hardware

In a semiconductor supply chain, what are the security and trust issues in an untrusted design house from the IP vendor’s point of view? 1. List all possible security and trust issues in an IC supply chain when the design house sends the design for fabrication to an untrusted facility. 2. Why is encryption not

Protecting hardware Read More »

Reverse engineered

SAT attack directly finds the key used for obfuscation. The features of design integrated with gate camouflaging can never be reverse engineered. The entire truth table is not needed to attack a design obfuscated by camouflaging. In state space obfuscation, modification cells are added to hide the newly inserted FSM. An attacker cannot reverse engineer

Reverse engineered Read More »

Hamming Distance

Reverse engineering of hardware IP is considered illegal. 1. None of the software obfuscation approaches are applicable to hardware IPs. 2. The design house is untrusted in certain scenarios in an IC supply chain. 3. For maximum output entropy in logic locking, Hamming Distance should be 100%.

Hamming Distance Read More »

The supply chain

Determine the correct key for the logic encrypted circuit below in Fig. 14.12 (in other words, what key makes x = x’ and y = y’). Explain your answer. 1. Describe the vulnerabilities in each step of the supply chain of an IC. 2. Briefly describe the possible obfuscation-based solutions for countering hardware IP piracy

The supply chain Read More »

Architecture

Briefly discuss SAT attack on logic locking. Also, describe the effect of a distinguishing input pattern (DIP) generated during the SAT attack. 1. What are the programmable resources within the FPGA architecture that could be modified to enable bitstream obfuscation?

Architecture Read More »

Ecosystem

Meltdown does not rely on speculative execution; it exploits only out-of-order execution. 1. Internet-of-things ecosystem cannot be attacked using any hardware-software exploit because it is too diverse for the attacker. 2. Software Trigged Hardware Trojans can be used to cause denial-of-service (DoS) attack. 3. Preventing the execution of the clflush (cache flush) command can deter

Ecosystem Read More »

Trusted Execution Environment

Trusted Execution Environment can prevent DoS attacks. 1. Evict+Time requires knowledge of cache structure to properly trigger cache contention in a system. 2. Security policies no longer need to be defined when using Security Policy Enforcement Architectures. 3. Modifications to DfD are needed to maintain both security and controllability of internal signals. 4. For pre-silicon

Trusted Execution Environment Read More »

WhatsApp
Hello! Need help with your assignments?

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

🛡️ Worried About Plagiarism? Run a Free Turnitin Check Today!
Get peace of mind with a 100% AI-Free Report and expert editing assistance.

X