全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

时序电路有限状态机设计的安全性研究
Security of Finite State Machines in Sequential Circuits

DOI: 10.3969/j.issn.0258-2724.2017.02.028

Keywords: 有限状态机,硬件安全,时序电路,设计功能无关状态,
finite state machine
,hardware security,sequential circuit,don't care state

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对有限状态机优化设计过程中与功能无关的状态会带来的潜在安全问题,基于对其被侵入因素和攻击途径进行分析的基础上,提出了安全状态的定义,并实现了安全状态的设计方法。通过增加T触发器一个反馈信号,在不影响触发器功能条件下,对有限状态机进行状态保护。研究结果表明:添加状态自锁后的实验电路在功耗、时延和面积上要比原始实验电路提高了144.7%;优化T触发器后的实验电路在功耗上比原始实验电路降低了3。6%,在面积上降低了18.9%,在时延上提高了19.6%。
: In view of the potential security problems brought by the don't care state in the optimization of finite state machine (FSM), the definition of safe state and its design method are presented after analysis of the factors leading to intrusion into FSM and the attack paths. Without affecting the flip-flop function, state protection of FSM is realized by adding a feedback signal to the T-type flip-flop. Results show that the experimental circuit with state feedback signal is 144.7% higher than the original experimental circuit in the power consumption, delay and area; the experimental circuit optimized with T-type flip-flop is 3.6% lower than the original experimental circuit in power consumption, 18.9% lower in area, and 19.6% higher in delay

References

[1]  GU Juan, QU Gang, ZHOU Qiang. Information hiding for trusted system design[C]//46th ACM/IEEE Design Automation Conference. New York: IEEE, 2009: 698-701.
[2]  SALLY A. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39.
[3]  EC O. On integrated circuits supply chain issues in a global commercial market[C]//Defense Security and Access Concerns.March, New York: [s.n.], 2007: 578-581.
[4]  刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679. LIU Li, WANG Yongqing. Security analysis of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679.
[5]  TRIMBERGER S. Trusted design in FPGAs[C]//44th ACM/IEEE Design Automation Conference. California: [s.n.], 2007: 5-8.
[6]  CHRISTOPHER U. Complexity of two-level logic minimization[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(7): 1230-1246.
[7]  施惠丰,袁道华. 基于多核的多线程程序优化研究[J]. 计算机技术与发展,2010,20(6): 70-73. SHI Huifeng, YUAN Daohua. Research on optimizing multi-thread programming based on multi-core processor[J]. Computer Technology and Development, 2010, 20(6): 70-73.
[8]  颜玉兰,何克清,刘进. 一种基于有限状态机的模型转换方法[J]. 计算机工程,2006,32(1): 93-95,200. YAN Yulan, HE Keqing, LIU Jin. A method of model transformation based on finite state machine[J]. Computer Engineering, 2006, 32(1): 93-95, 200.
[9]  CHRISTOPHER B. A system for sequential synthesis and verification[CP/OL]. [2016-01-01].http://embedded.eecs.berkeley.edu/pubs/downloads/sis/.
[10]  WEI Sheng, LI Kai, FARINAZ K, et al. Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry[C]//49th ACM/IEEE Design Automation Conference. New York: IEEE, 2012: 90-95.
[11]  YUAN Lin, QU Gang, VILLA T, et al. An FSM re-engineering: a novel approach to sequential circuit synthesis [J]. Journal IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Archive, 2008, 27(6): 1159-1164.
[12]  WEI Sheng, LI Kai, KOUSHANFAR F. Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry[C]//ACM/IEEE Design Automation Conference. New York: IEEE, 2012: 90-95.
[13]  范明俊,李宁,赵乐军,等. 一种安全可靠性高的全新IP核保护方法[J]. 微电机学,2007,37(2): 185-188. FAN Mingjun, LI Ning, ZHAO Lejun, et al. A new ip protection method with high safety[J]. Microelectronics, 2007, 37(2): 185-188.
[14]  ZHANG Jie, YUAN Feng, WEI Lingxiao, et al. Veritrust: verification for hardware trust[C]//DAC '13 Proceedings of the 50th Annual Design Automation Conference. New York: [s.n.], 2013: 670-675.
[15]  杨庆. 有限状态机的设计与优化[J]. 湖北民族学院学报:自然科学版,2006,24(1): 55-57. YANG Qing. Design and optimization of finite state machine[J]. Journal of Hubei Institute for Nationalities: Natural Science Edition, 2006, 24(1): 55-57.
[16]  孔昕,吴武臣,侯立刚,等. 基于Verilog 的有限状态机设计与优化[J]. 微电子学与计算机,2010,27(2): 180-183. KONG Xin, WU Wuchen, HOU Ligang, et al. Verilog design and optimization of fsms[J]. Microelectronics & Computer, 2010, 27(2): 180-183

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133