Protecting software from adversarial attacks is extremely important
for DoD technologies. When systems are compromised, the possibility
exists for recovery costing millions of dollars and countless labor
hours. Circuits implemented on embedded systems utilizing FPGA
technology are the result of downloading software for instantiating
circuits with specific functions or components. We consider the
problem of component hiding a form of software protection.
Component identification is a well studied problem. However, we use
component identification as a metric for driving the cost of
reverse engineering to an unreasonable level. We contribute to
protection of software and circuitry by implementing a Java based
component identification tool. With this tool, we can characterize
time required for carrying out adversarial attacks on unaltered
boolean circuitry. To counter component identification methods we
utilize boundary blurring techniques which are either semantic
preserving or semantic changing in order to prevent component
identification methods. Furthermore, we will show these techniques
can drive adversarial cost to unreasonable levels preventing
compromise of critical systems.
General
| Imprint: |
Biblioscholar
|
| Country of origin: |
United States |
| Release date: |
December 2012 |
| First published: |
December 2012 |
| Authors: |
James D. Parham
|
| Dimensions: |
246 x 189 x 8mm (L x W x T) |
| Format: |
Paperback - Trade
|
| Pages: |
144 |
| ISBN-13: |
978-1-288-40930-3 |
| Categories: |
Books >
Social sciences >
Education >
General
Promotions
|
| LSN: |
1-288-40930-3 |
| Barcode: |
9781288409303 |
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!