期刊文献+

自动复位快速环树数据采集算法 被引量:1

Quick Data Collecting Algorithm Based on Ring-tree with Auto-reset
在线阅读 下载PDF
导出
摘要 获取时序可编程逻辑器件内部状态转移关系是可编程逻辑器件逆向分析的关键和安全缺陷分析的基础。在分析现有可编程逻辑器件数据采集算法的基础上,基于环树数据采集算法,提出一种自动复位机制,以实现可编程逻辑器件功能全集数据的采集;针对环树数据采集算法驱动路径动态变化的问题,提出一种动态最短路径算法,以减少状态转移次数,提高采集效率。实验结果显示,自动复位快速环树数据采集算法不仅实现了可编程逻辑器件功能全集数据的正确采集,而且数据采集效率比现有算法提高了约9%。 Acquisition of inside-states-transition-functions of sequential PLD is the main point of PLD reverse analysis and the foundation of security vulnerability analysis.With the analysis of existing data collecting algorithms,an auto-reset mechanism was proposed to collect the PLD functional corpora data based on the ring-tree data collecting algorithm.For the dynamic change problems of driver paths of the ring-tree data collecting algorithm,a novel dynamic shortest path algorithm was proposed which reduces the times of state transition and improves the efficiency of data collection.Experiment results show that quick data collecting algorithm based on ring-tree with auto-reset can not only realize the collection of functional corpora data correctly,but also increase about 9% of data collection efficiency than existing algorithms.
出处 《计算机科学》 CSCD 北大核心 2012年第10期303-307,共5页 Computer Science
基金 国家高技术研究发展(计划)(863)项目(2009AA01Z434)资助
关键词 可编程逻辑器件 数据采集 自动复位 最短路径 Programmable logic device Data collection Auto-reset Shortest path
  • 相关文献

参考文献21

  • 1Chakraborty R S,Paul S, Bhunia S. On demand transparency for improving hardware Trojan detectability[A]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust[C]. 2008 : 48-50.
  • 2Stefan D, Mitchell C, Almenar C G. Trojan Attacks for Compro- mising Cryptographic Security in FPGA Encryption Systems [EB/OL]. http://199.98. 20. 129/-stefan/projects/csave38/ csaw08 cooper_submission/cooper csaw08, pdf, 2008-09-27.
  • 3Wolff F, Papachristou C, Bhunia S, et al. Towards trojan-free trusted ics: problem analysis and detection scheme[A]//Pro- ceedings of Design Automation and Test in Europe[C]. 2008: 1362-1365.
  • 4Adamov A, Saprykin A, Melnik D, et al. The Problem of Hard-ware Trojans Detection in System-on-Chip[A]//Proceedings of CADSM' 2009[C]. Polyana-Svalyava UKRAINE, 2009 : 178-179.
  • 5Kash J A, Tsang J C, Knebel D R. Method and Apparatus tor Reverse Engineering Integrated Circuits by Monitoring Optical Emission[P]. United States Patent Number 6. 2002,022 B1 : 496.
  • 6Chipworks Inc. Semiconductor Manufacturing Reverse Engi- neering of Semiconductor components, parts and process[EB/ OL]. http://www, chipworks, com.
  • 7Abramovici M, Bradley P. Integrated Circuit Security: New Threats and Solutions[A]//Proceedings of 5th Ann. Workshop Cyber Security and Information Intelligence Research:Cyber Se- curity and Information Challenges and Strategies [C]. ACM Press, 2009 : 55.
  • 8Chakraborty R S, et al. MERO: A Statistical Approach for Hardware Trojan Detection[A]//Proceedings of Workshop on Cryptographic Hardware and Embedded Systems [C]. LNCS 5747,2009:396-410.
  • 9Agarwal D, Baktir S, Karakoyunlu D, et al. Trojan detection u- sing IC fingerprinting[C]//IEEE Symp. on Security and Privacy. 2007 : 20-23.
  • 10Banga M, Chandrasekhar M, Fang Lei, et al. Guided test genera tion for isolation and detection of embedded trojans in ICs[A]// Proceedings of the 18th ACM Great Lakes Symposium on VLSI [C]. 2008:363- 366.

二级参考文献26

  • 1王阳.构建信息化社会的物质基础[EB/OL].http://www.paper.edu.com.
  • 2Chen Zhi-min,Guo Xu,Nagesh R. Hardware Trojan Designs on BASYS FPGA Board [EB/OL]. http://filebox. vt. edu/users/ xuguo/homepage/pu-blications/csaw08. pdf, 2008-09-19.
  • 3Chakraborty R S, Paul S, Bhunia S. On-demand transparency for improving hardware Trojan detectability [C]//Proc of IEEE International Workshop on Hardware-Oriented Security and Trust. Wuhan, China, 2008: 48-50.
  • 4Stefan D, Mitchell C, Almenar C G. Trojan Attacks for Compromising Cryptographic Security in FPGA Encryption Systems[EB/OL]. http://199. 98. 20. 129/-stefan/projects/csaw08/ csaw08_cooper_submission/cooper_csaw08.pdf,2008 09-27.
  • 5Wolff F, Papachristou C, Bhunia S, et al. Towards trojan-free trusted ics: problem analysis and detection scheme[C]//Proc of Design Automation and Test in Europe. 2008:1362-1365.
  • 6Adamov A, Saprykin A, Melnik D, et al. The Problem of Hard ware Trojans Detection in System-on Chip[C]//Proc of CAD Systems in Mieroelectronics. Polyana-Svalyava UKRAINE, 2009..178-179.
  • 7Marsh C, Kean T. A Security Tagging Scheme for Application Specific Intellecture Property Cores [EB/OL]. http://www. carolmarsh. co. uk/resources/Tagging_ESS_11_10_06. pdf, 2008 10-11.
  • 8Skorobogatov S, Anderson R. Opticail Fauh Induction Attacks, Cryptographic[C]//Proc of Hardware and Embedded System Workshop. LNCS, Springer-Verlag, 2002 : 2532 : 2-12.
  • 9Golden C,Cartridge T. Oomputer Chip Usage and the Impact on the After market[J]. Static Control Components,2002:36-46.
  • 10Chang K-H, Markov I L, Bertacco V. Fixing Design Errors with Counter examples and Resynthesis[J]. IEEE Trans. on Computer Aided Design,2008,27(1):184-188.

共引文献10

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部