Preview

Informatics

Advanced search

FEATURES OF OBFUSCATION OF VHDL-DESIGNS AND ITS COMPLEXITY EVALUATION METHODS

Abstract

Lexical and functional obfuscation is formalized. Brief survey of methods of lexical obfuscation is given and their drawbacks are investigated when applied to specifications in VHDL language. Complexity evaluation methods for specifications in VHDL language are considered. Complexity evaluation for different variants of VHDL specifications of a given digital device is presented.

About the Authors

V. V. Sergeichik
Белорусский государственный университет информатики и радиоэлектроники
Belarus


A. A. Ivaniuk
Белорусский государственный университет информатики и радиоэлектроники
Belarus


References

1. Hardware Security Mechanisms for Authentication and Trust // GLSVLSI 2011 [Electronic resource]. – Mode of access : http://www.glsvlsi.org/archive/glsvlsi11/Koushanfar_MeteringGLS-VLSI.pdf. – Date of access : 9.04.2013.

2. Active Hardware Metering for Intellectual Property Protection and Security // Usenix [Electronic resource]. – Mode of access : https://www.usenix.org/conference/16th-usenix-security-symposium/activehardware- metering-intellectual-property-protection. – Date of access : 5.04.2013.

3. Majzoobi, M. Introduction to hardware security and trust / M. Majzoobi, F. Koushanfar, M. Potkonjak. – N. Y. : Springer, 2011. – 427 p.

4. Collberg, C. A Taxonomy of Obfuscating Transformations / C. Collberg, C. Thomborson, D. Low. – Auckland : Department of Computer Science, 1997. – 36 p.

5. Иванюк, А.А. Проектирование встраиваемых цифровых устройств и систем : монография / А.А. Иванюк. – Минск : Бестпринт, 2012. – 337 с.

6. Brzozowski, M. Obfuscation quality in hardware designs / M. Brzozowski, V.N. Yarmolik // Zeszyty Naukowe Politechniki Bialostockiej. Informatyka. – 2009. – № 4. – P. 19–29.

7. Circuit o l i // Wikipedia [Electronic Resource]. – Mode of Access :http://www.en.wikipedia.org/wiki/Circuit_complexity. – Date of Access : 8.09.2013.

8. Hou, T. Three control flow obfuscation methods for Java software / T.W. Hou, H.Y. Chen, M.H. Tsai // Software IEE Proceedings. – 2006. – Vol. 153(2). – P. 80–86.

9. Компиляторы: принципы, технологии, инструменты / А. Ахо [и др.]. – 2-е изд. – СПб. : Вильямс, 2008. – 1184с.

10. Software Protection Through Dynamic Code Mutation / M. Madou [et al.] // Information Security Applications : 6th International Workshop WISA–2005. – Jiju Island, Korea, 2005. – P. 194–206.

11. Ярмолик, В.Н. Криптография, стеганография и охрана авторского права /В.Н. Ярмолик, С.С. Портянко, С.В. Ярмолик. – Минск : Изд. центр БГУ, 2007. – 240 с.

12. Software Complexity Measurement / J. Kearney [et al.] // Communications of the ACM. – 1986. – Vol. 29. – P. 1044–1050.

13. Sheng, Y. A Survey on Metric of Software Complexity / Y. Sheng, Z. Shijie // Information Management and Engineering (ICIME). – Chengdu, China, 2010. – P. 352–356.

14. Макконелл, С. Совершенный код / С. Макконелл. – СПб. : Питер, 2005. – 893 с.

15. Gupta, V. Object-oriented cognitive-spatial complexity measures / V. Gupta, K. Chhabra // International J. of Computer Engineering & Science. – 2009. – Vol. 3. – P. 122–129.


Review

For citations:


Sergeichik V.V., Ivaniuk A.A. FEATURES OF OBFUSCATION OF VHDL-DESIGNS AND ITS COMPLEXITY EVALUATION METHODS. Informatics. 2014;(1):116-125. (In Russ.)

Views: 888


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1816-0301 (Print)
ISSN 2617-6963 (Online)