首页 > 最新文献

IEEE Design & Test of Computers最新文献

英文 中文
Guest Editors' Introduction to Practical Parallel EDA 客座编辑介绍实用并行EDA
Pub Date : 2013-06-05 DOI: 10.1109/MDAT.2012.2237138
R. Topaloglu, B. Baas
The articles in this special section focus on parallel computing platforms in electronic design automation.
本专题的文章主要关注电子设计自动化中的并行计算平台。
{"title":"Guest Editors' Introduction to Practical Parallel EDA","authors":"R. Topaloglu, B. Baas","doi":"10.1109/MDAT.2012.2237138","DOIUrl":"https://doi.org/10.1109/MDAT.2012.2237138","url":null,"abstract":"The articles in this special section focus on parallel computing platforms in electronic design automation.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"30 1","pages":"6-7"},"PeriodicalIF":0.0,"publicationDate":"2013-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2012.2237138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62450397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components 客座编辑的介绍:受信任的系统芯片与不受信任的组件
Pub Date : 2013-06-05 DOI: 10.1109/MDAT.2013.2258093
S. Bhunia, D. Agrawal, L. Nazhandali
The articles in this special section focus on design of trusted systems-on-chip components and applications for their use.
这个特殊部分中的文章主要关注可信的片上系统组件的设计及其使用的应用程序。
{"title":"Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components","authors":"S. Bhunia, D. Agrawal, L. Nazhandali","doi":"10.1109/MDAT.2013.2258093","DOIUrl":"https://doi.org/10.1109/MDAT.2013.2258093","url":null,"abstract":"The articles in this special section focus on design of trusted systems-on-chip components and applications for their use.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"220 1","pages":"5-7"},"PeriodicalIF":0.0,"publicationDate":"2013-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2258093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62450706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Let's stop trusting software with our sensitive data 让我们不要再相信软件会泄露我们的敏感数据
Pub Date : 2013-06-05 DOI: 10.1109/MDAT.2013.2259096
Christopher W. Fletcher, Marten van Dijk, S. Devadas
The paper states that people are trusting the cloud more and more to perform sensitive operations. Demanding more trust in software systems is a recipe for disaster. Suppose the people only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. These properties will correspond to cryptographic operations being implemented correctly in the hardware and adding a modicum of physical security. The beauty of hardware is that its functionality is fixed. If we design our systems to only depend on hardware properties, then we need not worry about software changes or patches introducing new security holes-inevitable in current systems. How can it ensure privacy of data despite the practically infinite number of malicious programs out there? The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.
该论文指出,人们越来越信任云来执行敏感操作。对软件系统要求更多的信任是一种灾难。假设人们只信任硬件制造商和密码学家,而不信任系统软件开发人员、应用程序程序员或其他软件供应商。硬件制造商的工作将是生产一种提供某些安全属性的硬件。这些属性将对应于在硬件中正确实现的加密操作,并添加少量物理安全性。硬件的美妙之处在于它的功能是固定的。如果我们设计的系统只依赖于硬件属性,那么我们就不必担心软件更改或补丁会引入新的安全漏洞——这在当前系统中是不可避免的。它如何在几乎无穷无尽的恶意程序存在的情况下确保数据的隐私?Ascend处理器试图实现这些目标;客户端必须信任的唯一实体是处理器本身。
{"title":"Let's stop trusting software with our sensitive data","authors":"Christopher W. Fletcher, Marten van Dijk, S. Devadas","doi":"10.1109/MDAT.2013.2259096","DOIUrl":"https://doi.org/10.1109/MDAT.2013.2259096","url":null,"abstract":"The paper states that people are trusting the cloud more and more to perform sensitive operations. Demanding more trust in software systems is a recipe for disaster. Suppose the people only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. These properties will correspond to cryptographic operations being implemented correctly in the hardware and adding a modicum of physical security. The beauty of hardware is that its functionality is fixed. If we design our systems to only depend on hardware properties, then we need not worry about software changes or patches introducing new security holes-inevitable in current systems. How can it ensure privacy of data despite the practically infinite number of malicious programs out there? The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"30 1","pages":"103-104"},"PeriodicalIF":0.0,"publicationDate":"2013-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2259096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62450728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Don't forget test! [design-for-test] 别忘了测试!(针对)
Pub Date : 2013-06-01 DOI: 10.1109/MDAT.2013.2271570
R. Bennetts
{"title":"Don't forget test! [design-for-test]","authors":"R. Bennetts","doi":"10.1109/MDAT.2013.2271570","DOIUrl":"https://doi.org/10.1109/MDAT.2013.2271570","url":null,"abstract":"","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"30 1","pages":"103-104"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2271570","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62451156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A look at our industry's challenges 看看我们行业面临的挑战
Pub Date : 2013-06-01 DOI: 10.1109/MDAT.2013.2269775
A. Ivanov
h OUR INDUSTRY FACES a complex myriad of potential problems and challenges across all mediums involving design and test, and the resulting solutions and research methods used to counter experience problems are even more varied and comprehensive. Thus, it makes sense for us at some point to introduce a variety of some of the most current and striking areas of contemporary research and experimentation to our readers. While a narrower focus on selected themes is certainly a top priority for us, the reality is that our industry is varied in the truest sense of the word, and the occasional wide-issue can serve immense benefits in representing this point. This is what we have compiled in this issue; a compendium of recent, highly relevant selections that runs the gamut of problems and solutions in design and test, not only from an interindustry standpoint ranging from Trojans to 3D integration, but also from an international perspective that accounts for studies carried out across the globe. We have provided articles that should give our readers a highly interesting, yet widely informative, background on some of the most prevalent issues facing our global industry today. Indeed, our current market is filled with an ever-increasing need to go faster while maintaining fluid and efficient design; and this is a pursuit that must be highlighted on a cross-industry, global scope, if we are to fully take part in the increasing depth of international communication and collaboration. To start things off, we follow up from our last issue’s focus by providing an examination of Trojan threats due to design vulnerability with ‘‘Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution.’’ A reliance on third-party hardware IP is also highlighted as a cause for concern. A protection solution is proposed to combine predeployment design with postdeployment monitoringVa comprehensive method with high hopes for future defense. Our second entry, ‘‘Exploiting Multiple Mahalanobis Distance Metric to Screen Outliers From Analogue Product Manufacturing Test Responses,’’ provides an in-depth explanation from the University of Twente, The Netherlands, of two problemswith the Mahalanobis Distance classification method, before suggesting a new, more effective method of Multiple Mahalanobis. The conclusions are exemplified by the study of a real-world automobile product. A collaboration from New York University researchers is our third entry called ‘‘ExpeditedCompact Architecture for Average Scan Power Reduction,’’ and proposes an architectural solution to strengthen the reliability of chip under test. This selection poses to minimize scan power hot spots and high heat, while upholding design flow and delivering savings in test power. From here, we travel to researchers from the University of Ferhat Abbes in Algeria for our fourth entry, who present ‘‘An Optical BILBO for On-Line Testing of Embedded Systems,’’ an online optical testing approach to detect immedia
我们的行业在涉及设计和测试的所有媒介中都面临着无数复杂的潜在问题和挑战,而用于应对经验问题的解决方案和研究方法则更加多样化和全面。因此,在某种程度上,我们有必要向读者介绍一些当代研究和实验的最新和最引人注目的领域。虽然专注于特定主题是我们的首要任务,但现实情况是,我们的行业在最真实的意义上是多样化的,偶尔的广泛问题可以为代表这一点提供巨大的好处。这是我们在本期中整理的内容;这是一份最新的、高度相关的选择汇编,涵盖了设计和测试中的各种问题和解决方案,不仅从跨行业的角度来看,从特洛伊木马到3D集成,而且从全球范围内进行的研究的国际视角来看。我们所提供的文章将为我们的读者提供一个非常有趣的,但广泛的信息,关于当今全球行业面临的一些最普遍的问题的背景。事实上,我们当前的市场充满了不断增长的需求,即在保持流畅和高效设计的同时更快;如果我们要充分参与日益深入的国际交流与合作,就必须在跨行业、全球范围内强调这一点。首先,我们将继续上一期的重点内容,通过“防止硬件木马攻击:迈向全面解决方案”来检查由于设计漏洞造成的木马威胁。对第三方硬件IP的依赖也是一个值得关注的问题。提出了一种将部署前设计与部署后监测相结合的防护方案,是一种对未来防御寄予厚望的综合防护方法。我们的第二个条目“利用多重马氏距离度量来筛选模拟产品制造测试响应中的异常值”,在提出一种新的、更有效的多重马氏距离分类方法之前,荷兰特温特大学对马氏距离分类方法的两个问题进行了深入的解释。最后以实际汽车产品为例,对所得结论进行了验证。来自纽约大学研究人员的合作是我们的第三个项目,名为“降低平均扫描功耗的加速紧凑架构”,并提出了一种架构解决方案,以加强被测芯片的可靠性。这种选择可以最大限度地减少扫描功率热点和高热,同时保持设计流程并节省测试功率。从这里开始,我们前往阿尔及利亚Ferhat Abbes大学的研究人员,他们提出了“嵌入式系统在线测试的光学BILBO”,这是一种在线光学测试方法,可以在不影响正常运行的情况下检测嵌入式系统中的即时故障。研究了在实时检测中使用内置自检将复制和比较相结合的方法,目的是促进对光学检测益处的进一步研究。我们的第五个条目“用于软件映射探索的流应用程序的自动校准”提出了一个工具流程,可以有效地将流应用程序映射到MPSoC虚拟平台上。
{"title":"A look at our industry's challenges","authors":"A. Ivanov","doi":"10.1109/MDAT.2013.2269775","DOIUrl":"https://doi.org/10.1109/MDAT.2013.2269775","url":null,"abstract":"h OUR INDUSTRY FACES a complex myriad of potential problems and challenges across all mediums involving design and test, and the resulting solutions and research methods used to counter experience problems are even more varied and comprehensive. Thus, it makes sense for us at some point to introduce a variety of some of the most current and striking areas of contemporary research and experimentation to our readers. While a narrower focus on selected themes is certainly a top priority for us, the reality is that our industry is varied in the truest sense of the word, and the occasional wide-issue can serve immense benefits in representing this point. This is what we have compiled in this issue; a compendium of recent, highly relevant selections that runs the gamut of problems and solutions in design and test, not only from an interindustry standpoint ranging from Trojans to 3D integration, but also from an international perspective that accounts for studies carried out across the globe. We have provided articles that should give our readers a highly interesting, yet widely informative, background on some of the most prevalent issues facing our global industry today. Indeed, our current market is filled with an ever-increasing need to go faster while maintaining fluid and efficient design; and this is a pursuit that must be highlighted on a cross-industry, global scope, if we are to fully take part in the increasing depth of international communication and collaboration. To start things off, we follow up from our last issue’s focus by providing an examination of Trojan threats due to design vulnerability with ‘‘Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution.’’ A reliance on third-party hardware IP is also highlighted as a cause for concern. A protection solution is proposed to combine predeployment design with postdeployment monitoringVa comprehensive method with high hopes for future defense. Our second entry, ‘‘Exploiting Multiple Mahalanobis Distance Metric to Screen Outliers From Analogue Product Manufacturing Test Responses,’’ provides an in-depth explanation from the University of Twente, The Netherlands, of two problemswith the Mahalanobis Distance classification method, before suggesting a new, more effective method of Multiple Mahalanobis. The conclusions are exemplified by the study of a real-world automobile product. A collaboration from New York University researchers is our third entry called ‘‘ExpeditedCompact Architecture for Average Scan Power Reduction,’’ and proposes an architectural solution to strengthen the reliability of chip under test. This selection poses to minimize scan power hot spots and high heat, while upholding design flow and delivering savings in test power. From here, we travel to researchers from the University of Ferhat Abbes in Algeria for our fourth entry, who present ‘‘An Optical BILBO for On-Line Testing of Embedded Systems,’’ an online optical testing approach to detect immedia","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"30 1","pages":"4-5"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2269775","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62451063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Is Money 时间就是金钱
Pub Date : 2013-02-01 DOI: 10.1109/MDT.2012.2228294
G. Smith
Gary Smith gives an outlook that looks forward all the way to 2025 and gives insight as to how parallel EDA plays a role in reducing cost.
Gary Smith对2025年进行了展望,并就并行EDA如何在降低成本方面发挥作用提出了见解。
{"title":"Time Is Money","authors":"G. Smith","doi":"10.1109/MDT.2012.2228294","DOIUrl":"https://doi.org/10.1109/MDT.2012.2228294","url":null,"abstract":"Gary Smith gives an outlook that looks forward all the way to 2025 and gives insight as to how parallel EDA plays a role in reducing cost.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"24 1","pages":"55-57"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDT.2012.2228294","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62470245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Making Parallel EDA Serve Practical Applications 使并行EDA服务于实际应用
Pub Date : 2013-02-01 DOI: 10.1109/MDAT.2013.2251831
A. Ivanov
{"title":"Towards Making Parallel EDA Serve Practical Applications","authors":"A. Ivanov","doi":"10.1109/MDAT.2013.2251831","DOIUrl":"https://doi.org/10.1109/MDAT.2013.2251831","url":null,"abstract":"","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"30 1","pages":"4-5"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2251831","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62450569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test Technology TC Newsletter 测试技术委员会通讯
Pub Date : 2013-01-21 DOI: 10.1109/MDAT.2014.2308364
T. Theocharides
The TTTC website has been updated to include several more features and information for its visitors! To find out more, please visit the website at http://www.ieee-tttc.org/ .
TTTC网站已经更新,为访问者提供了更多的功能和信息!欲了解更多信息,请访问网站http://www.ieee-tttc.org/。
{"title":"Test Technology TC Newsletter","authors":"T. Theocharides","doi":"10.1109/MDAT.2014.2308364","DOIUrl":"https://doi.org/10.1109/MDAT.2014.2308364","url":null,"abstract":"The TTTC website has been updated to include several more features and information for its visitors! To find out more, please visit the website at http://www.ieee-tttc.org/ .","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"3 1","pages":"602-603"},"PeriodicalIF":0.0,"publicationDate":"2013-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74015863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating Emulation and Providing Full Chip Observability and Controllability at Run-Time 加速仿真并在运行时提供全芯片的可观察性和可控性
Pub Date : 2013-01-01 DOI: 10.1109/MDT.2009.91
I. Mavroidis, Ioannis Mavroidis, I. Papaefstathiou
Performing hardware emulation on FPGAs is a significantly faster and more accurate approach for the verification of complex designs than software simulation. Therefore, hardware Simulation Accelerator and Emulator co-processor units are used to offload calculation-intensive tasks from the software simulator. However, the communication overhead between the software simulator and the hardware emulator is becoming a new critical bottleneck. Moreover, in a hardware emulation environment it is impossible to bring outside of the chip a large number of internal signals for verification purposes. Therefore, on-chip observability has become a significant issue. In our work we tackle both aforementioned problems. First, we deploy a novel emulation framework that automatically transforms into synthesizable code certain HDL parts of the testbench, in order to offload them from the software simulator and, more importantly, minimize the aforementioned communication overhead. Next, we extend this architecture by adding multiple fast scan-chain paths in the design in order to provide full circuit observability and controllability on the fly. In this paper, we briefly describe our approach for reducing the communication overhead problem, and present, for the first time, our complete innovative system which offers extensive observability and controllability in complex Design Under Tests (DUTs).
在fpga上进行硬件仿真是一种比软件仿真更快、更准确的验证复杂设计的方法。因此,硬件仿真加速器和模拟器协处理器单元被用于从软件模拟器中卸载计算密集型任务。然而,软件模拟器和硬件模拟器之间的通信开销成为一个新的关键瓶颈。此外,在硬件仿真环境中,不可能将大量内部信号带到芯片外部进行验证。因此,片上可观测性已成为一个重要的问题。我们在工作中同时解决了这两个问题。首先,我们部署了一个新的仿真框架,该框架自动将测试台架的某些HDL部分转换为可合成代码,以便将它们从软件模拟器中卸载,更重要的是,将上述通信开销降至最低。接下来,我们通过在设计中添加多个快速扫描链路径来扩展该架构,以便在飞行中提供完整的电路可观察性和可控性。在本文中,我们简要地描述了我们减少通信开销问题的方法,并首次提出了我们完整的创新系统,该系统在复杂的测试下设计(DUTs)中提供了广泛的可观察性和可控性。
{"title":"Accelerating Emulation and Providing Full Chip Observability and Controllability at Run-Time","authors":"I. Mavroidis, Ioannis Mavroidis, I. Papaefstathiou","doi":"10.1109/MDT.2009.91","DOIUrl":"https://doi.org/10.1109/MDT.2009.91","url":null,"abstract":"Performing hardware emulation on FPGAs is a significantly faster and more accurate approach for the verification of complex designs than software simulation. Therefore, hardware Simulation Accelerator and Emulator co-processor units are used to offload calculation-intensive tasks from the software simulator. However, the communication overhead between the software simulator and the hardware emulator is becoming a new critical bottleneck. Moreover, in a hardware emulation environment it is impossible to bring outside of the chip a large number of internal signals for verification purposes. Therefore, on-chip observability has become a significant issue. In our work we tackle both aforementioned problems. First, we deploy a novel emulation framework that automatically transforms into synthesizable code certain HDL parts of the testbench, in order to offload them from the software simulator and, more importantly, minimize the aforementioned communication overhead. Next, we extend this architecture by adding multiple fast scan-chain paths in the design in order to provide full circuit observability and controllability on the fly. In this paper, we briefly describe our approach for reducing the communication overhead problem, and present, for the first time, our complete innovative system which offers extensive observability and controllability in complex Design Under Tests (DUTs).","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"172 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDT.2009.91","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62466831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardware Trojans in Wireless Cryptographic Integrated Circuits 无线加密集成电路中的硬件木马
Pub Date : 2013-01-01 DOI: 10.1109/MDT.2009.162
Yier Jin, Y. Makris
We study the problem of hardware Trojans in wireless cryptographic integrated circuits, wherein the objective is to leak secret information (i.e. the encryption key) through the wireless channel. Using a mixed-signal system-on-chip, consisting of a DES encryption core and a UWB transmitter, we demonstrate the following three key findings of this study: i) Simple malicious modifications to the digital part of a wireless cryptographic chip suffice to leak information without changing the more sensitive analog part. We demonstrate two hardware Trojan examples, which leak the encryption key by manipulating the transmission amplitude or frequency. ii) Such hardware Trojans do not change the functionality of the digital part or the performances of the analog part and their impact on the wireless transmission parameters can be hidden within the fabrication process variations. Hence, neither traditional manufacturing testing nor recently proposed hardware Trojan detection methods will expose them. iii) For the attacker to be able to discern the leaked information from the legitimate signal, effective hardware Trojans must impose some structure to the transmission parameters. While this structure is not known to the defender, advanced statistical analysis of these parameters (i.e. transmission power), may reveal its existence and, thereby, expose the hardware Trojan.
研究无线加密集成电路中的硬件木马问题,其目标是通过无线信道泄露机密信息(即加密密钥)。使用由DES加密核心和UWB发射机组成的混合信号片上系统,我们展示了本研究的以下三个关键发现:i)对无线加密芯片的数字部分进行简单的恶意修改足以泄露信息,而无需改变更敏感的模拟部分。我们展示了两个硬件木马实例,它们通过操纵传输幅度或频率来泄露加密密钥。ii)此类硬件木马不会改变数字部分的功能或模拟部分的性能,其对无线传输参数的影响可以隐藏在制造工艺的变化中。因此,无论是传统的制造测试还是最近提出的硬件木马检测方法都不会暴露它们。iii)为了使攻击者能够从合法信号中识别泄露的信息,有效的硬件木马必须对传输参数施加一些结构。虽然防御者不知道这种结构,但对这些参数(即传输功率)的高级统计分析可能会揭示它的存在,从而暴露硬件木马。
{"title":"Hardware Trojans in Wireless Cryptographic Integrated Circuits","authors":"Yier Jin, Y. Makris","doi":"10.1109/MDT.2009.162","DOIUrl":"https://doi.org/10.1109/MDT.2009.162","url":null,"abstract":"We study the problem of hardware Trojans in wireless cryptographic integrated circuits, wherein the objective is to leak secret information (i.e. the encryption key) through the wireless channel. Using a mixed-signal system-on-chip, consisting of a DES encryption core and a UWB transmitter, we demonstrate the following three key findings of this study: i) Simple malicious modifications to the digital part of a wireless cryptographic chip suffice to leak information without changing the more sensitive analog part. We demonstrate two hardware Trojan examples, which leak the encryption key by manipulating the transmission amplitude or frequency. ii) Such hardware Trojans do not change the functionality of the digital part or the performances of the analog part and their impact on the wireless transmission parameters can be hidden within the fabrication process variations. Hence, neither traditional manufacturing testing nor recently proposed hardware Trojan detection methods will expose them. iii) For the attacker to be able to discern the leaked information from the legitimate signal, effective hardware Trojans must impose some structure to the transmission parameters. While this structure is not known to the defender, advanced statistical analysis of these parameters (i.e. transmission power), may reveal its existence and, thereby, expose the hardware Trojan.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":"23 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDT.2009.162","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62465648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
IEEE Design & Test of Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1