首页> 外文期刊>IEEE transactions on very large scale integration (VLSI) systems >Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
【24h】

Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach

机译:使用不受信任的组件构建可信赖的系统:一种高级综合方法

获取原文
获取原文并翻译 | 示例

摘要

Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs. We use a diverse set of vendors to prevent collusions between the 3PIPs from the same vendor. We identify design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporate them during high-level synthesis. In addition, we develop techniques to reduce the number of vendors. The effectiveness of the proposed techniques is validated using the high-level synthesis benchmarks.
机译:片上系统设计的可信赖性受到第三方知识产权(3PIP)中的恶意逻辑(Trojan)的破坏。在本文中,复制,多样性和隔离原则已扩展为使用不受信任的,可能受Trojan感染的3PIP来检测可构建信任的系统。我们使用各种各样的供应商,以防止同一供应商的3PIP之间发生共谋。我们确定了特洛伊木马检测的设计约束条件,以实现检测,防止串通以及隔离受特洛伊木马感染的3PIP,并在高级综合过程中将其合并。此外,我们开发了减少供应商数量的技术。使用高级综合基准可以验证所提出技术的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号