May 8, 2023, 1:10 a.m. | Michaela Brunner, Hye Hyun Lee, Alexander Hepp, Johanna Baehr, Georg Sigl

cs.CR updates on arXiv.org arxiv.org

Reverse engineering of finite state machines is a serious threat when
protecting designs against reverse engineering attacks. While most recent
protection techniques rely on the security of a secret key, this work presents
a new approach: hardware state machine honeypots. These honeypots lead the
reverse engineering tools to a wrong, but for the tools highly attractive state
machine, while the original state machine is made less attractive. The results
show that state-of-the-art reverse engineering methods favor the highly
attractive honeypot …

attacks engineering finite state hardware honeypot honeypots key machine machines protecting protection reverse reverse engineering secret secret key security serious state techniques threat tools work

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA