首页> 外文期刊>International Journal of Fluid Engineering >Microcontroller Code Protection Technique based on Simulated-Hot-spot Analysis of Instruction Access Pattern
【24h】

Microcontroller Code Protection Technique based on Simulated-Hot-spot Analysis of Instruction Access Pattern

机译:基于仿真访问模式的模拟 - 热点分析的微控制器码保护技术

获取原文
获取原文并翻译 | 示例
       

摘要

Internet-of-Thing (IoT)-enabled embedded systems are controlled by microcontrollers (MCUs) with embedded on-chip flash memory,in which the binary patterns of user software are stored and accessed during runtime. Commer-cial system implementors have made an effort to hide the embedded software code, but conventional approaches are vulnerable to aggressive instruction bus monitoring method which directly probe the bare metal layer of the chip die surface with the high-resolution equipment. The user binary code-scrambling method resolves this weak point, but this requires large memory overhead to store the corresponding flags to decode into original binary code. In this paper, we propose a method to reduce these embedded flag bits by only scrambling the binary code in frequently accessed-hot-spot regions. The custom-designed simulation method to efficiently analyze hot-spot regions is newly presented. The proposed techniques are applied to the Mentor 8051 core using a 0.18um Magnachip flash-embedded CMOS process and the benefits in terms of area reduction are evaluated for the Dhrystone benchmark.
机译:Internet-One Level(IoT)的嵌入式系统由微控制器(MCU)控制,其中嵌入式片上闪存,其中在运行时在运行时存储和访问用户软件的二进制模式。商业系统实施器已经努力隐藏嵌入式软件代码,但传统的方法容易受到侵略性指令总线监控方法,该方法直接探测芯片模板的裸金属层与高分辨率设备。用户二进制码加扰方法解析了这种弱点,但这需要大的内存开销来存储相应的标志来解码到原始二进制代码中。在本文中,我们提出了一种方法来减少这些嵌入的标志比特,仅通过频繁访问的热点区域扰乱二进制代码。新呈现了有效分析热点区域的定制设计的仿真方法。所提出的技术使用0.18um magnachip闪存的CMOS工艺应用于导师8051核心,对DHRYSTHEEN基准进行评估面积减少方面的益处。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号