基于大數(shù)據(jù)分析的有限狀態(tài)機(jī)結(jié)構(gòu)反演技術(shù)研究
發(fā)布時間:2023-01-12 16:10
芯片(integrated circuits,ICs)如今已經(jīng)應(yīng)用在人類生活的方方面面。隨著萬物互聯(lián)時代的到來,芯片的應(yīng)用規(guī)模將達(dá)到新的高度。芯片的安全與我們每個人以及整個國家的安全息息相關(guān)。一旦芯片的存在漏洞,攻擊者可以利用芯片漏洞竊取個人的隱私信息、關(guān)鍵信息,威脅個人經(jīng)濟(jì)財產(chǎn)以及人身安全。利用芯片漏洞,他國攻擊者甚至可以輕易對國家關(guān)鍵武器、軍事設(shè)施、財務(wù)系統(tǒng)以及科研儀器等安全敏感系統(tǒng)實(shí)施攻擊,嚴(yán)重威脅國家安全。因此確保芯片安全是當(dāng)下最重要的議題之一。在大數(shù)據(jù)時代下,數(shù)據(jù)分析技術(shù)飛速發(fā)展,同時數(shù)據(jù)分析在金融、電子商務(wù)、物流配送、廣告點(diǎn)擊等眾多領(lǐng)域取得了顯著的成功。數(shù)據(jù)分析技術(shù)是對混雜且低價值密度的海量數(shù)據(jù)分析的技術(shù),能發(fā)掘數(shù)據(jù)中潛在的有價值信息。利用數(shù)據(jù)分析,黑客可以改良攻擊方式、節(jié)約時間成本、挖掘芯片潛在的信息,進(jìn)而極大提升自身攻擊能力。強(qiáng)大的數(shù)據(jù)分析技術(shù)會對芯片安全造成了巨大的威脅。這使得以往的安全性設(shè)計(jì)以及防御手段在新型的基于數(shù)據(jù)分析的攻擊下變得不再可靠。有限狀態(tài)機(jī)(finite state machine,FSM)在芯片中常常作為控制模塊出現(xiàn)。在集成電路的整個設(shè)計(jì)流程中,FS...
【文章頁數(shù)】:63 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
Abstract
Acknowledgement
Nomenclature
Chapter 1 Introduction
1.1 Hardware Security in The Era of Big Data
1.2 The Role of Finite State Machine in Hardware Security
1.3 Existing Attacks on FSM
1.4 Researches on Extracting FSM
1.5 Motivation and Objectives
1.6 Organization of The Dissertation
Chapter 2 Overall Scheme of FSM Retrieval by Big Data Analytics
2.1 Percept
2.2 Overview of Overall Scheme
2.3 Summary
Chapter 3 The Analysis on Register Impact Based on Decision Tree Algorithm
3.1 Full Scan Chain Based Data Collection Algorithm
3.2 Impact of Register on State Transitions
3.3 Decision Tree Based Register Impact Analysis
3.3.1 Regression Analysis
3.3.2 Decision Tree Algorithm
3.3.3 Identification of FSM Registers
3.3.4 An Illustrative Example
3.4 Analysis and Evaluation
3.5 Summary
Chapter 4 Identification of State Registers Based on The Relevancy
4.1 Register Matching
4.1.1 Pattern Matching and Sequence Matching
4.1.2 Regularity of A Sequence
4.2 Identification of FSM Registers Based on Register Matching
4.2.1 Algorithm on Generation of Division
4.2.2 Register Relevancy Computing
4.2.3 FSM Register Identification and Feature Vector Extraction
4.3 One-hot Based FSM Register Identification Algorithm
4.4 Extraction of State Transition Graph
4.5 Analysis and Evaluation
4.6 Summary
Conclusions
References
Author’s Publications
本文編號:3730118
【文章頁數(shù)】:63 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
Abstract
Acknowledgement
Nomenclature
Chapter 1 Introduction
1.1 Hardware Security in The Era of Big Data
1.2 The Role of Finite State Machine in Hardware Security
1.3 Existing Attacks on FSM
1.4 Researches on Extracting FSM
1.5 Motivation and Objectives
1.6 Organization of The Dissertation
Chapter 2 Overall Scheme of FSM Retrieval by Big Data Analytics
2.1 Percept
2.2 Overview of Overall Scheme
2.3 Summary
Chapter 3 The Analysis on Register Impact Based on Decision Tree Algorithm
3.1 Full Scan Chain Based Data Collection Algorithm
3.2 Impact of Register on State Transitions
3.3 Decision Tree Based Register Impact Analysis
3.3.1 Regression Analysis
3.3.2 Decision Tree Algorithm
3.3.3 Identification of FSM Registers
3.3.4 An Illustrative Example
3.4 Analysis and Evaluation
3.5 Summary
Chapter 4 Identification of State Registers Based on The Relevancy
4.1 Register Matching
4.1.1 Pattern Matching and Sequence Matching
4.1.2 Regularity of A Sequence
4.2 Identification of FSM Registers Based on Register Matching
4.2.1 Algorithm on Generation of Division
4.2.2 Register Relevancy Computing
4.2.3 FSM Register Identification and Feature Vector Extraction
4.3 One-hot Based FSM Register Identification Algorithm
4.4 Extraction of State Transition Graph
4.5 Analysis and Evaluation
4.6 Summary
Conclusions
References
Author’s Publications
本文編號:3730118
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/3730118.html
最近更新
教材專著