Font Size: a A A

A Research Of Hardware Vulnerability Mining Method Based On FSM Analysis

Posted on:2021-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q YanFull Text:PDF
GTID:2428330626955912Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
There is growing concern from researchers about hardware security,within which hardware vulnerability mining is an important research orientation.Finite state machine(FSM)is an important part of hardware design.It will be of greate significance to come up with a hardware vulnerability mining method by combining FSM and hardware vulnerability mining.To discover hardware vulnerability,regarding FSM as starting point in this paper,research has been conducted in FSM extraction,FSM vulnerability mining,and attack path generation of FSM vulnerability.The main contents are as following:(1)Proposing a FSM extraction methodAiming at the FSM extraction of HDL code,a new FSM extraction method is proposed in this paper.Using HDL code as input,every part of the design that is identified as FSM will be extracted by this method.In addition,the FSM structure identification and FSM equivalent transformation of this method take HDL code instead of netlist as input,which will exclude some influence of synthesis tools to some extent.Finally,this method is able to use simulation to solve incomplete FSM extraction problem,which exists in traditional FSM extraction method.(2)Research of FSM vulnerability mining methodAiming at the FSM vulnerability,this paper launches related research on FSM vulnerability mining.Firstly,in this paper,research on basic FSM vulnerability is launched,FSM vulnerability propagation model is proposed,in the meanwhile,spreadability and availability of vulnerability is analyzed.Then,for the two types of FSM vulnerability,this paper comes up with FSM vulnerability mining method and analysis method of vulnerability spread respectively.Finally,in the FSM vulnerability propagation anlysis,a register classification method which is able to solve the loop identification and register classification problems effectively is proposed in this paper.(3)Proposing an attack path generation of FSM vulnerability methodIn order to make it convenient for designers and users to make up for and defend against FSM vulnerabilities,an attack path generation method is proposed in this paper.Based on backtracking and FSM structure,this method successfully designs a backtracking model.Then,backtrack strategy is designed from multiple perspectives,based on which this paper realizes the generation of attack path.Compared to the traditional backtracking method,this method is able to alleviate data explsion to some extent.In addition,this method will be helpful to some research like test pattern generation.Through experiment,it is proved that the above research is able to realize FSM extraction,FSM vulnerability mining and attack path generation.By means of the research,hardware vulnerability mining is eventually achieved.
Keywords/Search Tags:Hardware vulnerability mining, FSM, Vulnerability spread, Attack path generation
PDF Full Text Request
Related items