Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware attack defense method and device based on TDC module, and electronic equipment

A hardware and clock signal technology, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve problems such as consuming large hardware resources

Active Publication Date: 2022-02-15
ZHEJIANG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present application is to provide a TDC module-based hardware attack defense method, device, and electronic equipment to solve the problem that existing hardware-based defense methods in the related art can only defend against a single type of physical attack and require a large amount of time. Technical issues with hardware resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware attack defense method and device based on TDC module, and electronic equipment
  • Hardware attack defense method and device based on TDC module, and electronic equipment
  • Hardware attack defense method and device based on TDC module, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0043]The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware attack defense method and device based on a TDC module, and electronic equipment. The method comprises the following steps: inputting a configurable clock source into the TDC module, so as to enable the TDC module to output a delay clock signal group and a sampling signal through a delay unit chain; inputting the sampling signal into a pseudo-random number generator to enable the pseudo-random number generator to process the sampling signal, and outputting a chip selection signal; respectively using the chip selection signal and the delay clock signal group as a chip selection signal and an input signal of a multiplexer to be input into the multiplexer, enabling the multiplexer to output a misplaced clock signal, and using the misplaced clock signal as an input clock of an IP core needing to be protected; and presetting a threshold parameter for the TDC module, comparing the sampling signal and the preset threshold parameter, and if the sampling signal exceeds the range of the preset threshold, triggering the TDC module to output an early warning signal.

Description

technical field [0001] The present application relates to the technical field of fault attack analysis, in particular to a TDC module-based hardware attack defense method, device, and electronic equipment. Background technique [0002] With the rapid development of machine learning, stronger computing power is now required to support more and more complex network structures. Due to its high parallel computing power and high flexibility, FPGAs are widely used as acceleration units in cloud data centers. . At the same time, more and more cloud service providers are beginning to provide enterprise-oriented FaaS and AaaS services. Through these services, developers can use cloud FPGA resources to quickly realize the development of custom IP and realize profitability. In order to further utilize FPGA resources in the cloud, the industry proposes a multi-tenant scenario. In this scenario, the resources on the FPGA are dynamically allocated to each user, and this method can grea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/71
CPCG06F21/55G06F21/71
Inventor 张帆王智勇
Owner ZHEJIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More