-
公开(公告)号:US20230018185A1
公开(公告)日:2023-01-19
申请号:US17950493
申请日:2022-09-22
申请人: Arm Limited
发明人: Michael WEINER , Oded GOLOMBEK , Harel ADANI
摘要: A method for obfuscating data at-transit can include receiving, at a first component on a chip, an instruction request for communicating a first data to a second component on the chip. The first component can be a processor and the second component can be an associated memory. The method can further include, determining a sequence of data arranged to obfuscate the first data while including valid bits of the first data, wherein the sequence of data indicates what is to be conveyed across lines on the chip during each time slot over a window of time controlled by a clock signal on the chip; and providing, over the window of time, the first data to the second component across the lines on the chip according to the sequence of data.
-
公开(公告)号:US20240012946A1
公开(公告)日:2024-01-11
申请号:US18371045
申请日:2023-09-21
申请人: Arm Limited
IPC分类号: G06F21/75 , G06F30/398 , G06F30/396
CPC分类号: G06F21/75 , G06F30/398 , G06F30/396
摘要: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
-
公开(公告)号:US20210117575A1
公开(公告)日:2021-04-22
申请号:US16656362
申请日:2019-10-17
申请人: Arm Limited
发明人: Michael WEINER , Oded GOLOMBEK , David YELLIN
摘要: A method for obfuscation of operations using minimal additional hardware is presented herein. The method can begin by executing a first iteration of a set of computations, the execution of the set of computations resulting in a first iteration output. The method can continue by executing a second iteration of the set of computations, wherein the second execution is distinct from the first iteration but should satisfy a matching condition. The distinction can be a rearrangement of sub-operations, insertion of dummy sub-operations, or a combination of the two. After the iterations are complete, the iteration outputs can be compared. If the comparison of the first iteration output and the second iteration output satisfy the matching condition, the process result can be output. If the matching condition is not satisfied, an error detected signal can be output.
-
公开(公告)号:US20200151077A1
公开(公告)日:2020-05-14
申请号:US16190335
申请日:2018-11-14
申请人: Arm Limited
IPC分类号: G06F11/277 , G06F7/58 , H04L9/00
摘要: Aspects of the present disclosure relate to an apparatus comprising analogue circuitry comprising an entropy source, the entropy source being configured to provide a random output. The apparatus comprises first digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, and second digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, the second digital circuitry being a duplicate of the first digital circuitry. The apparatus comprises difference detection circuitry to determine a difference of operation between the first digital circuitry and the second digital circuitry. Each of the first digital circuitry and the second digital circuitry comprises entropy checking circuitry to check the entropy of the output of the entropy source.
-
公开(公告)号:US20210192089A1
公开(公告)日:2021-06-24
申请号:US16722459
申请日:2019-12-20
申请人: Arm Limited
IPC分类号: G06F21/75 , G06F21/78 , G06F30/347 , G06F30/327 , G06F30/396 , G06F9/54
摘要: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
-
公开(公告)号:US20210119763A1
公开(公告)日:2021-04-22
申请号:US16656388
申请日:2019-10-17
申请人: Arm Limited
发明人: Michael WEINER , Oded GOLOMBEK , Harel ADANI
摘要: A method for obfuscating data at-transit can include receiving a request for communicating data, determining a sequence of data at-transit for a window of time; and providing the sequence of the data at transit for performing communications across interconnect to another component. The described method can be carried out by an obfuscation engine implemented in an electronic system such as within a secure element. A secure element can include a processor and a memory. The obfuscation engine can be part of the processor, part of the memory, or a stand-alone component.
-
-
-
-
-