首页> 外文会议>2013 IEEE 31st International Conference on Computer Design >On design vulnerability analysis and trust benchmarks development
【24h】

On design vulnerability analysis and trust benchmarks development

机译:关于设计漏洞分析和信任基准开发

获取原文
获取原文并翻译 | 示例

摘要

The areas of hardware security and trust have experienced major growth over the past several years. However, research in Trojan detection and prevention lacks standard benchmarks and measurements, resulting in inconsistent research outcomes, and ambiguity in analyzing strengths and weaknesses in the techniques developed by different research teams and their advancements to the state-of-the-art. We have developed innovative methodologies that, for the first time, more effectively address the problem. We have developed a vulnerability analysis flow. The flow determines hard-to-detect areas in a circuit that would most probably be used for Trojan implementation to ensure a Trojan goes undetected during production test and extensive functional test analysis. Furthermore, we introduce the Trojan detectability metric to quantify Trojan activation and effect. This metric offers a fair comparison for analyzing weaknesses and strengths of Trojan detection techniques. Using these methodologies, we have developed a large number of trust benchmarks that are available for use by the public, as well as researchers and practitioners in the field.
机译:在过去的几年中,硬件安全性和信任度领域经历了重大增长。但是,特洛伊木马检测和预防方面的研究缺乏标准的基准和度量标准,导致研究结果不一致,并且在分析由不同研究团队开发的技术及其最新技术方面的优缺点时,模棱两可。我们已经开发出创新的方法,这是第一次更有效地解决该问题。我们已经开发了漏洞分析流程。该流确定了电路中难以检测到的区域,该区域很可能用于特洛伊木马程序,以确保在生产测试和广泛的功能测试分析期间不会检测到特洛伊木马。此外,我们引入了特洛伊木马可检测性指标来量化特洛伊木马的激活和效果。该指标为分析特洛伊木马检测技术的弱点和优势提供了公平的比较。使用这些方法,我们开发了许多信任基准,可供公众以及该领域的研究人员和从业人员使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号