Security chip design method based on control flow detection and resistant to error injection attack

A fault injection attack and security chip technology, applied in the field of security chip design, can solve problems such as increased program performance, non-jumping errors in instruction sequences, and increased probability of detecting instruction errors, achieving low redundant code overhead, Resistant to error injection attacks, implementing simple effects

Inactive Publication Date: 2013-10-09
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (1) Error detection of jumps inside basic blocks: The existing control flow detection technology mainly focuses on the correctness of jumps between basic blocks, but it is not appropriate for the error jumps of non-jump instructions inside basic blocks. the solution
[0014] (2) Detection of non-jump errors in instruction sequences: The existing control flow detection technology is limited to the error detection of program jumps, and does not take into account the non-jumps caused by errors in the opcode or operand of the instruction itself. sexual error
[0015] (3) Self-verification of new control flow detection inst

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip design method based on control flow detection and resistant to error injection attack
  • Security chip design method based on control flow detection and resistant to error injection attack
  • Security chip design method based on control flow detection and resistant to error injection attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make it easier for those skilled in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0052] The present invention is described in more detail below in conjunction with accompanying drawing example:

[0053] The general flow of a kind of specific embodiment of the present invention is as figure 1 As shown, the definition and description of the added control flow detection extension instructions are shown in Table 1, and the specific implementation process is described as follows:

[0054] (1) High-level language source files are compiled to generate standard assembly files.

[0055] High-level language source files can be source programs written in C, C++ or other high-level languages, as long as they are supported by the compiler used by the security chip; for the static or dynamic binary library files called by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security chip design method based on control flow detection and resistant to error injection attack. The security chip design method comprises a first step of compiling a standard assembling file which supports a security chip, a second step of dividing the standard assembling file into basic blocks by means of lexical analysis, a third step of generating basic block signature values and forming an assembling file with a control flow detection instruction, a fourth step of translating the assembling file into a target file, generating basic block checking values and inserting basic block checking instructions, and a fifth step of generating an executable file from the target file and a database file link and executing the executable file on hardware. The security chip design method based on control flow detection and resistant to error injection attack can effectively detect skip errors among the basic blocks and inside each basic block and non-skip errors of a command sequence, has the self checking function on the control flow detection instruction which is newly added, and is simple in implementation and low in redundancy code cost by the adoption of the mode of combination of software and hardware.

Description

technical field [0001] The invention relates to a security chip design technology, in particular to a security chip design technology based on control flow detection to resist error injection attacks, so as to achieve the purpose of resisting error injection attacks. Background technique [0002] In the information age, the issue of information security is becoming more and more important. As the core component of information security, security chips that provide encryption, authentication, secure storage and other security services as the main functions are more and more widely used. At the same time, attacks on security chips are also emerging in an endless stream, which makes it urgent to study the protection technology of security chips. [0003] Fault injection attack is a semi-invasive attack, the attack principle is to try to change the environmental parameters (the electrical performance of the chip will change with different voltage, temperature, light, ionizing rad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 黄威宋丹丹廖望刘恺张亮邓承诺陈攀戴葵
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products