期刊文献+

时序PLD安全缺陷检测方法研究 被引量:1

Research on Sequential PLD Security Vulnerability Detection Method
下载PDF
导出
摘要 可编程逻辑器件(PLD)在电子设备中广泛应用,其安全缺陷检测已成为信息安全领域中一个富有挑战性的课题。通过分析PLD安全缺陷的存在形式,提出了基于状态转移图的安全缺陷检测方法。该方法统一了检测思路,采用了脱机式芯片逆向分析和在线式芯片逆向分析相结合的技术,适用于不同的PLD安全缺陷检测,同时根据存在形式提出了检测算法。最后通过模拟测试对该检测思路及算法的有效性进行了验证。 Due to the wide application of PLD in the electronic devices,the vulnerability detection of PLD has become a challenging subject in the information security field.By analyzing the existence form of PLD security vulnerability,a security vulnerability detection method was proposed,based on state transition diagram.Using off-line reverse analysis and on-system reverse analysis technology,this method unifies the detection ideas,which is suitable for different PLD security vulnerability detection.Then the detection algorithms were proposed on the basis of the existence forms.Finally,the effectiveness of the detection ideas and algorithms were verified by simulation.
出处 《计算机科学》 CSCD 北大核心 2012年第5期53-56,79,共5页 Computer Science
基金 国家863目标导向项目(2009AA01Z434)资助
关键词 可编程逻辑器件 状态转移图 安全缺陷检测 Programmable logic device State transition diagram Security vulnerability detection
  • 相关文献

参考文献17

  • 1王阳.构建信息化社会的物质基础[EB/OL].http://www.paper.edu.com. 被引量:1
  • 2Chen Zhi-min,Guo Xu,Nagesh R. Hardware Trojan Designs on BASYS FPGA Board [EB/OL]. http://filebox. vt. edu/users/ xuguo/homepage/pu-blications/csaw08. pdf, 2008-09-19. 被引量:1
  • 3Chakraborty R S, Paul S, Bhunia S. On-demand transparency for improving hardware Trojan detectability [C]//Proc of IEEE International Workshop on Hardware-Oriented Security and Trust. Wuhan, China, 2008: 48-50. 被引量:1
  • 4Stefan D, Mitchell C, Almenar C G. Trojan Attacks for Compromising Cryptographic Security in FPGA Encryption Systems[EB/OL]. http://199. 98. 20. 129/-stefan/projects/csaw08/ csaw08_cooper_submission/cooper_csaw08.pdf,2008 09-27. 被引量:1
  • 5Wolff F, Papachristou C, Bhunia S, et al. Towards trojan-free trusted ics: problem analysis and detection scheme[C]//Proc of Design Automation and Test in Europe. 2008:1362-1365. 被引量:1
  • 6Adamov A, Saprykin A, Melnik D, et al. The Problem of Hard ware Trojans Detection in System-on Chip[C]//Proc of CAD Systems in Mieroelectronics. Polyana-Svalyava UKRAINE, 2009..178-179. 被引量:1
  • 7Marsh C, Kean T. A Security Tagging Scheme for Application Specific Intellecture Property Cores [EB/OL]. http://www. carolmarsh. co. uk/resources/Tagging_ESS_11_10_06. pdf, 2008 10-11. 被引量:1
  • 8Skorobogatov S, Anderson R. Opticail Fauh Induction Attacks, Cryptographic[C]//Proc of Hardware and Embedded System Workshop. LNCS, Springer-Verlag, 2002 : 2532 : 2-12. 被引量:1
  • 9Golden C,Cartridge T. Oomputer Chip Usage and the Impact on the After market[J]. Static Control Components,2002:36-46. 被引量:1
  • 10Chang K-H, Markov I L, Bertacco V. Fixing Design Errors with Counter examples and Resynthesis[J]. IEEE Trans. on Computer Aided Design,2008,27(1):184-188. 被引量:1

共引文献1

同被引文献20

  • 1Chakraborty R S,Paul S, Bhunia S. On demand transparency for improving hardware Trojan detectability[A]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust[C]. 2008 : 48-50. 被引量:1
  • 2Stefan D, Mitchell C, Almenar C G. Trojan Attacks for Compro- mising Cryptographic Security in FPGA Encryption Systems [EB/OL]. http://199.98. 20. 129/-stefan/projects/csave38/ csaw08 cooper_submission/cooper csaw08, pdf, 2008-09-27. 被引量:1
  • 3Wolff F, Papachristou C, Bhunia S, et al. Towards trojan-free trusted ics: problem analysis and detection scheme[A]//Pro- ceedings of Design Automation and Test in Europe[C]. 2008: 1362-1365. 被引量:1
  • 4Adamov A, Saprykin A, Melnik D, et al. The Problem of Hard-ware Trojans Detection in System-on-Chip[A]//Proceedings of CADSM' 2009[C]. Polyana-Svalyava UKRAINE, 2009 : 178-179. 被引量:1
  • 5Kash J A, Tsang J C, Knebel D R. Method and Apparatus tor Reverse Engineering Integrated Circuits by Monitoring Optical Emission[P]. United States Patent Number 6. 2002,022 B1 : 496. 被引量:1
  • 6Chipworks Inc. Semiconductor Manufacturing Reverse Engi- neering of Semiconductor components, parts and process[EB/ OL]. http://www, chipworks, com. 被引量:1
  • 7Abramovici M, Bradley P. Integrated Circuit Security: New Threats and Solutions[A]//Proceedings of 5th Ann. Workshop Cyber Security and Information Intelligence Research:Cyber Se- curity and Information Challenges and Strategies [C]. ACM Press, 2009 : 55. 被引量:1
  • 8Chakraborty R S, et al. MERO: A Statistical Approach for Hardware Trojan Detection[A]//Proceedings of Workshop on Cryptographic Hardware and Embedded Systems [C]. LNCS 5747,2009:396-410. 被引量:1
  • 9Agarwal D, Baktir S, Karakoyunlu D, et al. Trojan detection u- sing IC fingerprinting[C]//IEEE Symp. on Security and Privacy. 2007 : 20-23. 被引量:1
  • 10Banga M, Chandrasekhar M, Fang Lei, et al. Guided test genera tion for isolation and detection of embedded trojans in ICs[A]// Proceedings of the 18th ACM Great Lakes Symposium on VLSI [C]. 2008:363- 366. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部