Check patentability & draft patents in minutes with Patsnap Eureka AI!

Hardware vulnerability evaluation method based on HDL (Hardware Description Language) code

A vulnerability and hardware technology, applied in the design field of hardware vulnerability assessment method, can solve the problems that the dynamic detection method cannot accurately locate the location of the problem, the coverage of the detection problem and the detection efficiency are not ideal, so as to improve the stability and reliability effect

Inactive Publication Date: 2018-03-16
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the dynamic detection method cannot accurately locate the location of the problem, and the coverage and detection efficiency of the detection problem are not ideal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware vulnerability evaluation method based on HDL (Hardware Description Language) code
  • Hardware vulnerability evaluation method based on HDL (Hardware Description Language) code
  • Hardware vulnerability evaluation method based on HDL (Hardware Description Language) code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be understood that the implementations shown and described in the drawings are only exemplary, intended to explain the principle and spirit of the present invention, rather than limit the scope of the present invention.

[0025] The embodiment of the present invention provides a hardware vulnerability assessment method based on HDL codes, which starts from analyzing the vulnerability of links between different modules to evaluate the vulnerability of programs step by step. In order to facilitate the research, the embodiment of the present invention uses the concept of "graph" to first establish the abstract connection topology of the program modules through code analysis, and then evaluate each module of the program based on the module connection topology and the importance of links and modules grammatical fragility.

[0026] Such as fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware vulnerability evaluation method based on an HDL (Hardware Description Language) code. A program developed by the HDL is taken as the input of grammar semantic parsing, the connection topological relationship of each HDL module is established, the vulnerability weight of each edge is calculated on the basis of the connection topological relationship to evaluate the vulnerability of each module, and furthermore, vulnerability grade division is carried out on each module. By use of the method, guidance is provided for the hardware vulnerability detection of theHDL program so as to bring convenience for reinforcement design in subsequent program development to improve the stability and the reliability of a program system.

Description

technical field [0001] The invention belongs to the technical field of hardware security, and in particular relates to the design of a hardware vulnerability assessment method based on HDL codes. Background technique [0002] Based on the wide application of FPGA and ASIC, more and more programs are developed in Hardware Description Language (HDL, Hardware Description Language), and it is becoming more and more difficult to guarantee the security and reliability of programs using HDL. Just like various software security holes, there are also various security holes and design flaws in the HDL program development process. HDL language and software language have certain similarities in semantics, so the analysis and research methods of software vulnerability can be used for reference, which provides a direction for the hardware vulnerability of HDL programs. [0003] Software analysis takes "whether the software needs to be run" as the criterion in the analysis process, and so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F8/34G06F11/36
CPCG06F8/34G06F11/3604G06F11/3624
Inventor 陈哲王坚郭世泽李玉柏高振标
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More