RanCompute: Computational Security in Embedded Devices via Random Input and Output Encodings
- Georgia Institute of Technology,School of Electrical and Computer Engineering,Atlanta,Georgia
- Georgia Institute of Technology,School of Electrical and Computer Engineering School of Computer Science,Atlanta,Georgia
An embedded device in an insecure environment is subject to additional security risk through capture and reverse-engineering by a capable adversary. If this device contains a microchip performing sensitive computations, capture of the chip may leak functionality to an adversary. In this paper we propose a novel method in which we randomly encode the input operands and the outputs of a computation, thus not revealing the arithmetic operations being performed. The operations are sequenced in a graph representing the overall application. Once the initialization values are overwritten and lost, the results of these computations are indecipherable by the device performing the calculations as well as by any adversary. The result is transmitted back to a secure server which has stored the initialization values and so can decode the results which appear random to the adversary.
- Research Organization:
- Georgia Institute of Technology, Atlanta, GA (United States)
- Sponsoring Organization:
- USDOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER)
- DOE Contract Number:
- CR0000004
- OSTI ID:
- 1997030
- Report Number(s):
- DOE-GATECH-00004-4
- Journal Information:
- 2022 11th Mediterranean Conference on Embedded Computing (MECO), Conference: 2022 11th Mediterranean Conference on Embedded Computing (MECO) Budva, Montenegro 07-10 June 2022
- Country of Publication:
- United States
- Language:
- English
FPGA Dynamic and Partial Reconfiguration
|
journal | July 2018 |
A Computational Approach to Edge Detection
|
journal | November 1986 |
Sensing with Random Encoding for Enhanced Security in Embedded Systems
|
conference | June 2021 |
Multiset theory.
|
journal | December 1988 |
IP Protection and Supply Chain Security through Logic Obfuscation
|
journal | September 2019 |
Epic
|
conference | March 2008 |
FPGA Bitstream Security: A Day in the Life
|
conference | November 2019 |
Cryptography and cryptographic protocols
|
journal | September 2003 |
Similar Records
Inherent secure communications using lattice based waveform design
Gridtrust: Electricity Grid Root-of-Trust Decentralized Supply Chain Cyber-Security (Final Scientific/Technical Report)