NTRS - NASA Technical Reports Server

Back to Results
"Glitch Logic" and Applications to Computing and Information SecurityThis paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.
Document ID
Acquisition Source
Jet Propulsion Laboratory
Document Type
Conference Paper
External Source(s)
Stoica, Adrian
(Jet Propulsion Lab., California Inst. of Tech. Pasadena, CA, United States)
Katkoori, Srinivas
(University of South Florida Tampa, FL, United States)
Date Acquired
May 19, 2015
Publication Date
August 20, 2009
Subject Category
Computer Systems
Electronics And Electrical Engineering
Meeting Information
Meeting: 2009 International Symposium on Bio-Inspired, Learning, and Intelligent Systems for Security (BLISS 2009)
Location: Edinburgh
Country: United Kingdom
Start Date: August 20, 2009
End Date: August 22, 2009
Sponsors: Institute of Electrical and Electronics Engineers, Edinburgh Univ.
Distribution Limits
hardware vulnerabilities
information exfiltration
trusted design
protection to reverse engineering

Available Downloads

There are no available downloads for this record.
No Preview Available