基于大数据分析的有限状态机结构反演技术研究
发布时间:2023-01-12 16:10
芯片(integrated circuits,ICs)如今已经应用在人类生活的方方面面。随着万物互联时代的到来,芯片的应用规模将达到新的高度。芯片的安全与我们每个人以及整个国家的安全息息相关。一旦芯片的存在漏洞,攻击者可以利用芯片漏洞窃取个人的隐私信息、关键信息,威胁个人经济财产以及人身安全。利用芯片漏洞,他国攻击者甚至可以轻易对国家关键武器、军事设施、财务系统以及科研仪器等安全敏感系统实施攻击,严重威胁国家安全。因此确保芯片安全是当下最重要的议题之一。在大数据时代下,数据分析技术飞速发展,同时数据分析在金融、电子商务、物流配送、广告点击等众多领域取得了显著的成功。数据分析技术是对混杂且低价值密度的海量数据分析的技术,能发掘数据中潜在的有价值信息。利用数据分析,黑客可以改良攻击方式、节约时间成本、挖掘芯片潜在的信息,进而极大提升自身攻击能力。强大的数据分析技术会对芯片安全造成了巨大的威胁。这使得以往的安全性设计以及防御手段在新型的基于数据分析的攻击下变得不再可靠。有限状态机(finite state machine,FSM)在芯片中常常作为控制模块出现。在集成电路的整个设计流程中,FS...
【文章页数】:63 页
【学位级别】:硕士
【文章目录】:
摘要
Abstract
Acknowledgement
Nomenclature
Chapter 1 Introduction
1.1 Hardware Security in The Era of Big Data
1.2 The Role of Finite State Machine in Hardware Security
1.3 Existing Attacks on FSM
1.4 Researches on Extracting FSM
1.5 Motivation and Objectives
1.6 Organization of The Dissertation
Chapter 2 Overall Scheme of FSM Retrieval by Big Data Analytics
2.1 Percept
2.2 Overview of Overall Scheme
2.3 Summary
Chapter 3 The Analysis on Register Impact Based on Decision Tree Algorithm
3.1 Full Scan Chain Based Data Collection Algorithm
3.2 Impact of Register on State Transitions
3.3 Decision Tree Based Register Impact Analysis
3.3.1 Regression Analysis
3.3.2 Decision Tree Algorithm
3.3.3 Identification of FSM Registers
3.3.4 An Illustrative Example
3.4 Analysis and Evaluation
3.5 Summary
Chapter 4 Identification of State Registers Based on The Relevancy
4.1 Register Matching
4.1.1 Pattern Matching and Sequence Matching
4.1.2 Regularity of A Sequence
4.2 Identification of FSM Registers Based on Register Matching
4.2.1 Algorithm on Generation of Division
4.2.2 Register Relevancy Computing
4.2.3 FSM Register Identification and Feature Vector Extraction
4.3 One-hot Based FSM Register Identification Algorithm
4.4 Extraction of State Transition Graph
4.5 Analysis and Evaluation
4.6 Summary
Conclusions
References
Author’s Publications
本文编号:3730118
【文章页数】:63 页
【学位级别】:硕士
【文章目录】:
摘要
Abstract
Acknowledgement
Nomenclature
Chapter 1 Introduction
1.1 Hardware Security in The Era of Big Data
1.2 The Role of Finite State Machine in Hardware Security
1.3 Existing Attacks on FSM
1.4 Researches on Extracting FSM
1.5 Motivation and Objectives
1.6 Organization of The Dissertation
Chapter 2 Overall Scheme of FSM Retrieval by Big Data Analytics
2.1 Percept
2.2 Overview of Overall Scheme
2.3 Summary
Chapter 3 The Analysis on Register Impact Based on Decision Tree Algorithm
3.1 Full Scan Chain Based Data Collection Algorithm
3.2 Impact of Register on State Transitions
3.3 Decision Tree Based Register Impact Analysis
3.3.1 Regression Analysis
3.3.2 Decision Tree Algorithm
3.3.3 Identification of FSM Registers
3.3.4 An Illustrative Example
3.4 Analysis and Evaluation
3.5 Summary
Chapter 4 Identification of State Registers Based on The Relevancy
4.1 Register Matching
4.1.1 Pattern Matching and Sequence Matching
4.1.2 Regularity of A Sequence
4.2 Identification of FSM Registers Based on Register Matching
4.2.1 Algorithm on Generation of Division
4.2.2 Register Relevancy Computing
4.2.3 FSM Register Identification and Feature Vector Extraction
4.3 One-hot Based FSM Register Identification Algorithm
4.4 Extraction of State Transition Graph
4.5 Analysis and Evaluation
4.6 Summary
Conclusions
References
Author’s Publications
本文编号:3730118
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/3730118.html