-
公开(公告)号:US20230090772A1
公开(公告)日:2023-03-23
申请号:US17480771
申请日:2021-09-21
Applicant: Drexel University
Inventor: Kyle Joseph Juretus , Ioannis Savidis
Abstract: A proposed technique allows for the security of the logic cone through logic locking and secures the outputs of the circuit from the scan chain without modifications to the structure of the scan chain. Since the oracle responses in test mode do not correspond to the functional key, satisfiability (SAT) attacks are not able to leverage the responses from the scan chain. In addition, a charge accumulation circuit is developed to prevent and detect any attempt to enter the partitioned test mode while the correct circuit responses are still stored within the registers.
-
公开(公告)号:US11971987B2
公开(公告)日:2024-04-30
申请号:US17480771
申请日:2021-09-21
Applicant: Drexel University
Inventor: Kyle Joseph Juretus , Ioannis Savidis
CPC classification number: G06F21/556 , G06F21/76 , G06F2221/034
Abstract: A proposed technique allows for the security of the logic cone through logic locking and secures the outputs of the circuit from the scan chain without modifications to the structure of the scan chain. Since the oracle responses in test mode do not correspond to the functional key, satisfiability (SAT) attacks are not able to leverage the responses from the scan chain. In addition, a charge accumulation circuit is developed to prevent and detect any attempt to enter the partitioned test mode while the correct circuit responses are still stored within the registers.
-
公开(公告)号:US11177902B2
公开(公告)日:2021-11-16
申请号:US16478148
申请日:2018-01-15
Applicant: Drexel University
Inventor: James J. Chacko , Kapil R. Dandekar , Marko Jacovic , Kyle Joseph Juretus , Nagarajan Kandasamy , Cem Sahin , Ioannis Savidis
IPC: H04L9/08 , H04K1/00 , H04W12/03 , H04W12/037 , H04W12/041
Abstract: A physical layer based technique secures wireless communication between a transmitter and receiver. The technique involves obfuscating the preamble data of the baseband signal through unique keys that are generated at the transmitter and the receiver based on channel characteristics known only to them.
-
公开(公告)号:US20240214803A1
公开(公告)日:2024-06-27
申请号:US18146145
申请日:2022-12-23
Applicant: Drexel University
Inventor: Kapil R. Dandekar , James J. Chacko , Kyle Joseph Juretus , Marko Jacovic , Cem Sahin , Nagarajan Kandasamy , Ioannis Savidis
IPC: H04W12/0431 , H04W12/041
CPC classification number: H04W12/0431 , H04W12/041
Abstract: A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.
-
公开(公告)号:US11270031B2
公开(公告)日:2022-03-08
申请号:US16862111
申请日:2020-04-29
Applicant: Drexel University
Inventor: Ioannis Savidis , Vaibhav Venugopal Rao , Kyle Joseph Juretus
IPC: G06F21/75 , H03K21/02 , H03K5/1532 , H03M1/36
Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.
-
公开(公告)号:US11540120B2
公开(公告)日:2022-12-27
申请号:US16432509
申请日:2019-06-05
Applicant: Drexel University
Inventor: Kapil R. Dandekar , James J. Chacko , Kyle Joseph Juretus , Marko Jacovic , Cem Sahin , Nagarajan Kandasamy , Ioannis Savidis
IPC: H04W12/033 , G06F7/58 , H03M13/27 , H04W12/041 , H04L5/00
Abstract: A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.
-
公开(公告)号:US20210019449A1
公开(公告)日:2021-01-21
申请号:US16980471
申请日:2019-03-13
Applicant: Drexel University
Inventor: Kyle Joseph Juretus , Ioannis Savidis
Abstract: A state machine system on a chip presents hidden state transitions to create IC knowledge not available in a logical netlist and temporal key dependencies to increase the difficulty of executing the SAT attack. The change in the state space of a circuit over time may be used to increase circuit security. Hidden transitions that are frequency dependent, state dependent keys, and temporally dependent transition keys may be used as ways to increase security against SAT based attacks.
-
公开(公告)号:US20200342142A1
公开(公告)日:2020-10-29
申请号:US16862111
申请日:2020-04-29
Applicant: Drexel University
Inventor: Ioannis Savidis , Vaibhav Venugopal Rao , Kyle Joseph Juretus
IPC: G06F21/75 , H03M1/36 , H03K5/1532 , H03K21/02
Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.
-
-
-
-
-
-
-