Font Size: a A A

Research On The Method Of Computer Hardware Vulnerability Analysis

Posted on:2017-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:P H ZhangFull Text:PDF
GTID:2428330569999005Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The vulnerabilities of computer architecture are made up of two aspects,namely software vulnerabilities and hardware vulnerabilities.For a long time,the main work in the area of vulnerability analysis is to check softwares to ensure their security.This condition leads to the generation of several effective methods on software analysis,as well as the improvement of the security of softwares.However,hardware vulnerability has not attracted enough attention over the last years due to its restriction,abstractness and complexity.The analysis methods of hardware are not so much and usually have low efficiency,and achieved little significant results.So,current methods on hardware vulnerability analysis have restricted the security enhancement of the computer.Based on the analysis on the working process of traditional hardware analysis methods,as well as their advantages and disadvantages,the definition and the working process of collaborative formal verification of software and hardware are proposed.After that,the architecture and the building process of the formal model base are given.Aiming at the problem of the state space explosion during the modeling process,the predicate abstraction method based on variable constraint is proposed.Both theoretical analysis and the simulation results show its effectiveness.At last,the complete process of the new method has been demonstrated with two types of vulnerabilities.One is known already,and the other is discovered under the guidance of this method.Both the results of the two experiments prove the reliability of the new method successfully.
Keywords/Search Tags:Hardware Security, Vulnerability Analysis, Software and Hardware Collaboration, Model check
PDF Full Text Request
Related items