首页> 外文会议>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies >The detection method of probable areas of hardware Trojans location in FPGA-based components of safety-critical systems
【24h】

The detection method of probable areas of hardware Trojans location in FPGA-based components of safety-critical systems

机译:安全关键系统中基于FPGA的组件中硬件木马位置可能区域的检测方法

获取原文
获取原文并翻译 | 示例

摘要

The life cycle model of FPGA-based systems founded on emphasizing the stages of formation and modification of their program code is considered. At the stages next to the ones of low-level program code (bitstream) formation its integrity can be monitored with the help of hash embedded into the program code in the form of a digital watermark. Such kind of monitoring increases the complication of malicious logics fragments (hardware Trojans) implantation into the program code. At the earlier stages another (more formalized) set of actions is required for the counterstand to hardware Trojans emergence. In the given article the detection method of probable areas of hardware Trojans location in FPGA safety-critical systems is offered. The method is based on the fact that input data have different natures under the normal and emergency modes in safety-critical systems. The method offered can be used as the initial starting basis for counteraction to hardware Trojans implantation in the case when the program code integrity monitoring with the help of hash is impossible.
机译:考虑了基于FPGA的系统的生命周期模型,该模型建立在强调程序代码的形成和修改阶段的基础上。在低级程序代码(比特流)形成的下一阶段,可以借助以数字水印形式嵌入到程序代码中的哈希值来监视其完整性。这种监视增加了将恶意逻辑片段(硬件特洛伊木马)植入程序代码的复杂性。在早期阶段,需要采取另一组(更正式的)措施来对抗硬件特洛伊木马的出现。在给定的文章中,提供了在FPGA安全关键系统中可能检测到的硬件木马区域的方法。该方法基于以下事实:在安全关键型系统中,输入数据在正常模式和紧急模式下具有不同的性质。在无法借助哈希来监视程序代码完整性的情况下,提供的方法可以用作对抗硬件特洛伊木马程序植入的初始开始基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号