Advertisement

A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering

  • Md Sakib HasanEmail author
  • Md Badruddoja Majumder
  • Aysha S. Shanta
  • Mesbah Uddin
  • Garrett S. Rose
Article
  • 4 Downloads

Abstract

Chaos computing provides a large number of functions from a single hardware. Large-scale reconfigurability can be achieved flexibly by tuning only a few parameters from a chaos-based computing system. Implementation of reconfigurable complex functions from a single chaos circuit can alleviate area and power concerns due to decreasing technology nodes. It is possible to make a multi-input multi-output complex instruction set using the chaos-generated functionalities where operations are more uniform than conventional implementations. Lack of uniformity in implementation of instructions in traditional computing system provides opportunity for attackers to reverse engineer based on side channel power analysis. In this paper, it is proposed that chaos-based implementation of a complex instruction set is immune to classification-based reverse engineering attack. Cross obfuscation and self obfuscation schemes are proposed in this work which leverage reconfigurability of chaotic system for obfuscating the power profile of the instruction set and it has been made immune to reverse engineering attacks. The design utilizes 3-input multi-output instructions by using a single chaotic iterative map. We analyzed the immunity of this design against classification-based reverse engineering attack for six different classification algorithms with five dimensionality reduction techniques.

Keywords

Chaos computing Side channel Power profile Obfuscation Instruction classification Hardware security 

Notes

Funding Information

This work is based upon work supported by the Air Force Office of Scientific Research under award number FA9550-16-1-0301.

References

  1. 1.
    Aihara K (1989) Chaotic neural networks (bifurcation phenomena in nonlinear systems and theory of dynamical systems)Google Scholar
  2. 2.
    Blümel R, Kappler C, Quint W, Walther H (1989) Chaos and order of laser-cooled ions in a paul trap. Phys Rev A 40(2):808CrossRefGoogle Scholar
  3. 3.
    Bohl J, Yan LK, Rose GS (2015) A two-dimensional chaotic logic gate for improved computer security. In: 2015 IEEE 58th international midwest symposium on circuits and systems (MWSCAS), pp 1–4. IEEEGoogle Scholar
  4. 4.
    Cafagna D, Grassi G (2005) Chaos-based computation via chua’s circuit: Parallel computing with application to the sr flip-flop. In: International symposium on signals, circuits and systems, 2005. ISSCS 2005, vol 2, pp 749–752. IEEEGoogle Scholar
  5. 5.
    Chua LO, Lin GN (1990) Canonical realization of chua’s circuit family. IEEE Trans Circuits Syst 37 (7):885– 902MathSciNetCrossRefGoogle Scholar
  6. 6.
    Ditto WL, Miliotis A, Murali K, Sinha S, Spano ML (2010) Chaogates: morphing logic gates that exploit dynamical patterns. Chaos: An Interdisciplinary Journal of Nonlinear Science 20(3):037,107MathSciNetCrossRefGoogle Scholar
  7. 7.
    Duda RO, Hart PE, Stork DG (2012) Pattern classification, Wiley, New YorkGoogle Scholar
  8. 8.
    Dudek P, Juncu V (2003) Compact discrete-time chaos generator circuit. Electron Lett 39(20):1431–1432CrossRefGoogle Scholar
  9. 9.
    Ercsey-Ravasz M, Toroczkai Z (2011) Optimization hardness as transient chaos in an analog approach to constraint satisfaction. Nat Phys 7(12):966CrossRefGoogle Scholar
  10. 10.
    Feigenbaum MJ (1978) Quantitative universality for a class of nonlinear transformations. J Stat Phys 19 (1):25–52MathSciNetCrossRefGoogle Scholar
  11. 11.
    Feigenbaum MJ (1983) Universal behavior in nonlinear systems. Physica D: Nonlinear Phenomena 7(1-3):16–39MathSciNetCrossRefGoogle Scholar
  12. 12.
    Feki M (2003) An adaptive chaos synchronization scheme applied to secure communication. Chaos, Solitons & Fractals 18(1):141–148MathSciNetCrossRefGoogle Scholar
  13. 13.
    Fisher RA (1936) The use of multiple measurements in taxonomic problems. Annals of Eugenics 7(2):179–188CrossRefGoogle Scholar
  14. 14.
    Hayes S, Grebogi C, Ott E (1993) Communicating with chaos. Phys Rev Lett 70(20):3031CrossRefGoogle Scholar
  15. 15.
    Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48(2):163–169MathSciNetCrossRefGoogle Scholar
  16. 16.
    Juncu V, Rafiei-Naeini M, Dudek P (2006) Integrated circuit implementation of a compact discrete-time chaos generator. Analog Integr Circ Sig Process 46(3):275–280CrossRefGoogle Scholar
  17. 17.
    Kia B, Lindner J, Ditto WL, et al. (2015) Nonlinear dynamics based digital logic and circuits. Frontiers Comput Neurosci 9:49CrossRefGoogle Scholar
  18. 18.
    Kia B, Lindner JF, Ditto WL (2016) A simple nonlinear circuit contains an infinite number of functions. IEEE Transactions on Circuits and Systems II: Express Briefs 63(10):944–948CrossRefGoogle Scholar
  19. 19.
    Kia B, Mobley K, Ditto WL (2017) An integrated circuit design for a dynamics-based reconfigurable logic block. IEEE Transactions on Circuits and Systems II: Express BriefsGoogle Scholar
  20. 20.
    Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference, pp 388–397. SpringerGoogle Scholar
  21. 21.
    Kolumbán G, Vizvári B, Schwarz W, Abel A (1996) Differential chaos shift keying: a robust coding for chaos communication. In: Proceedings of NDES, vol 96, pp 87–92Google Scholar
  22. 22.
    Lindner JF, Kohar V, Kia B, Hippke M, Learned JG, Ditto WL (2015) Strange nonchaotic stars. Phys Rev Lett 114(5):054,101CrossRefGoogle Scholar
  23. 23.
    Lorenz EN (1963) Deterministic nonperiodic flow. J. Atmospheric Sci. 20(2):130–141MathSciNetCrossRefGoogle Scholar
  24. 24.
    Majumder MB, Hasan MS, Uddin M, Rose GS (2018) Chaos computing for mitigating side channel attack. In: 2018 IEEE international symposium on hardware oriented security and trust (HOST), pp 143–146. IEEEGoogle Scholar
  25. 25.
    Msgna M, Markantonakis K, Mayes K (2014) Precise instruction-level side channel profiling of embedded processors. In: International conference on information security practice and experience, pp 129–143. SpringerGoogle Scholar
  26. 26.
    Murali K, Sinha S, Ditto WL (2003) Implementation of nor gate by a chaotic chua’s circuit. International Journal of Bifurcation and Chaos 13(09):2669–2672CrossRefGoogle Scholar
  27. 27.
    Rose GS (2014) A chaos-based arithmetic logic unit and implications for obfuscation. In: 2014 IEEE computer society annual symposium on VLSI (ISVLSI), pp 54–58. IEEEGoogle Scholar
  28. 28.
    Sinha S, Ditto WL (1998) Dynamics based computation. Phys Rev Lett 81(10):2156CrossRefGoogle Scholar
  29. 29.
    Srisuchinwong B, San-Um W Implementation of a chua’s chaotic oscillator using “roughly-cubic-like” nonlinearityGoogle Scholar
  30. 30.
    Strang G (1993) Introduction to linear algebra, vol 3. Wellesley-Cambridge Press, WellesleyzbMATHGoogle Scholar
  31. 31.
    Strogatz SH (2018) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. CRC Press, Boca RatonCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Electrical EngineeringThe University of MississippiOxfordUSA
  2. 2.Department of Electrical Engineering and Computer ScienceThe University of TennesseeKnoxvilleUSA

Personalised recommendations