会议专题

Research on the Parallelism of Security Vulnerability Detection of Logic-unknown PLD

As the development of integrated circuit, the algorithms of security vulnerability detection available are not suitable for encrypted PLD in large scale, which would bring inacceptable consumption of memory and time. By analyzing the relation of input signals and output signals of the sequential logic circuit, the parallelism of state saturating and the parallelism between CPU and detection platform in vulnerability detection is digged out. Based on the parallelism, the model for parallel detection is proposed, which saturates state and searches the path for state transition on several detection equipments. The model makes full of resources of equipments, solves the problem that the memory is not enough to establish state transition diagram and reduces the time needed for vulnerability detection effectively.

PLD vulnerability detection parallelism state transition diagram

Li Zhou Qing-bao Li Min Fan Guang-en Zhou

Department of Computer Science and Technology Information Engineering University Zhengzhou, China Beijing Institute of Special Vehicles Beijing, China

国际会议

2009 International Forum on Computer Science-Technology and Applications(2009年国际计算机科学技术与应用论坛 IFCSTA 2009)

重庆

英文

803-807

2009-12-25(万方平台首次上网日期,不代表论文的发表时间)