Hardware Honeypot: Setting Sequential Reverse Engineering on a Wrong Track
Abstract
Reverse engineering (RE) of finite state machines (FSMs) is a serious threat when protecting designs against RE attacks. While most recent protection techniques rely on the security of a secret key, this work presents a new approach: hardware FSM honeypots. These honeypots lead the RE tools to a wrong but, for the tools, very attractive FSM, while making the original FSM less attractive. The results show that state-of-the-art RE methods favor the highly attractive honeypot as FSM candidate or do no longer detect the correct, original FSM.
- Publication:
-
arXiv e-prints
- Pub Date:
- May 2023
- DOI:
- 10.48550/arXiv.2305.03707
- arXiv:
- arXiv:2305.03707
- Bibcode:
- 2023arXiv230503707B
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- 2024 27th International Symposium on Design &