skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Non-Destructive State Machine Reverse Engineering

Abstract

Most of the integrated circuits (ICs) that are in electronic systems today are based on state machines. We are taking advantage of this to develop a hardware reverse engineering method that discovers the IC’s underlying state machine, rather than its transistors and gates. While there are other methods for destructively reverse engineering ICs or for non-destructively characterizing ICs, our method offers a fast and accurate analysis while remaining non-destructive. To do this, we present an intelligent brute-force method of exploring the logic of the IC using only the input and outputs designed into the IC - the I/O pins. From this exploration, we can apply a folding algorithm to discover the designed state machine.

Authors:
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1345466
Report Number(s):
PNNL-SA-96070
830403000
DOE Contract Number:
AC05-76RL01830
Resource Type:
Conference
Resource Relation:
Conference: 6th International Symposium on Resilient Control Systems (ISRCS 2013), August 13-15, 2013, 120-124
Country of Publication:
United States
Language:
English
Subject:
hardware reverse engineering; state machine; hardware trojan; counterfeit

Citation Formats

Smith, Jessica L. Non-Destructive State Machine Reverse Engineering. United States: N. p., 2013. Web. doi:10.1109/ISRCS.2013.6623762.
Smith, Jessica L. Non-Destructive State Machine Reverse Engineering. United States. doi:10.1109/ISRCS.2013.6623762.
Smith, Jessica L. Thu . "Non-Destructive State Machine Reverse Engineering". United States. doi:10.1109/ISRCS.2013.6623762.
@article{osti_1345466,
title = {Non-Destructive State Machine Reverse Engineering},
author = {Smith, Jessica L.},
abstractNote = {Most of the integrated circuits (ICs) that are in electronic systems today are based on state machines. We are taking advantage of this to develop a hardware reverse engineering method that discovers the IC’s underlying state machine, rather than its transistors and gates. While there are other methods for destructively reverse engineering ICs or for non-destructively characterizing ICs, our method offers a fast and accurate analysis while remaining non-destructive. To do this, we present an intelligent brute-force method of exploring the logic of the IC using only the input and outputs designed into the IC - the I/O pins. From this exploration, we can apply a folding algorithm to discover the designed state machine.},
doi = {10.1109/ISRCS.2013.6623762},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Thu Oct 10 00:00:00 EDT 2013},
month = {Thu Oct 10 00:00:00 EDT 2013}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: