Research on the Parallelism of Security Vulnerability Detection of Logic-unknown PLD
As the development of integrated circuit, the algorithms of security vulnerability detection available are not suitable for encrypted PLD in large scale, which would bring inacceptable consumption of memory and time. By analyzing the relation of input signals and output signals of the sequential logic circuit, the parallelism of state saturating and the parallelism between CPU and detection platform in vulnerability detection is digged out. Based on the parallelism, the model for parallel detection is proposed, which saturates state and searches the path for state transition on several detection equipments. The model makes full of resources of equipments, solves the problem that the memory is not enough to establish state transition diagram and reduces the time needed for vulnerability detection effectively.
PLD vulnerability detection parallelism state transition diagram
Li Zhou Qing-bao Li Min Fan Guang-en Zhou
Department of Computer Science and Technology Information Engineering University Zhengzhou, China Beijing Institute of Special Vehicles Beijing, China
国际会议
重庆
英文
803-807
2009-12-25(万方平台首次上网日期,不代表论文的发表时间)