{"title":"A Novel Logical Locking Technique Against Key-Guessing Attacks","authors":"S. Rajendran, M. N. Devi","doi":"10.1109/ISED.2018.8704003","DOIUrl":"https://doi.org/10.1109/ISED.2018.8704003","url":null,"abstract":"Logical locking is the most popular countermeasure against the hardware attacks like intellectual property (IP) piracy, Trojan insertion and illegal integrated circuit (IC) overproduction. The functionality of the design is locked by the added logics into the design. Thus, the design is accessible only to the authorized users by applying the valid keys. However, extracting the secret key of the logically locked design have become an extensive effort and it is commonly known as key guessing attacks. Thus, the main objective of the proposed technique is to build a secured hardware against attacks like Brute force attack, Hill climbing attack and path sensitization attacks. Furthermore, the gates with low observability are chosen for encryption, this is to obtain an optimal output corruption of 50% Hamming distance with minimal design overhead and implementation complexity. The experimental results are validated on ISCAS’85 benchmark circuits, with a highly secured locking mechanism.","PeriodicalId":448215,"journal":{"name":"International Symposium on Embedded Computing and System Design","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and Verification of the FlexRay Startup Mechanism using UPPAAL Model Checker","authors":"Shimmi Asokan, G. Santhosh Kumar","doi":"10.1109/ISED.2018.8704029","DOIUrl":"https://doi.org/10.1109/ISED.2018.8704029","url":null,"abstract":"The in-vehicle networking standards enables communication between the various Electronic Control Units (ECUs) in an automotive system. When the critical functions in an automotive system is controlled by ECUs, timely communication between the ECUs, sensors and actuators are important. Formal modelling and verification of the in-vehicle networking standards, will guarantee the correctness of these standards. FlexRay is a time triggered protocol that provides high transmission rates which enables it to be used in safety critical components of the automotive system. This work attempts to model the startup mechanism of the FlexRay protocol using the UPPAAL model checker. Properties related to the startup of the protocol were verified.","PeriodicalId":448215,"journal":{"name":"International Symposium on Embedded Computing and System Design","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}