NASA Logo

NTRS

NTRS - NASA Technical Reports Server

Back to Results
"Glitch Logic" and Applications to Computing and Information SecurityThis paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.
Document ID
20150008445
Document Type
Conference Paper
External Source(s)
Authors
Stoica, Adrian (Jet Propulsion Lab., California Inst. of Tech. Pasadena, CA, United States)
Katkoori, Srinivas (University of South Florida Tampa, FL, United States)
Date Acquired
May 19, 2015
Publication Date
August 20, 2009
Subject Category
Computer Systems
Electronics and Electrical Engineering
Meeting Information
2009 International Symposium on Bio-Inspired, Learning, and Intelligent Systems for Security (BLISS 2009)(Edinburgh)
Distribution Limits
Public
Copyright
Other
Keywords
hardware vulnerabilities
information exfiltration
trusted design
stego-design
protection to reverse engineering
anti-tamper