Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Rapid detection method for multi-dimensional vulnerability of hardware system

A hardware system and detection method technology, applied in the field of hardware security, can solve problems such as lack of system-level hardware vulnerability detection technology and method

Active Publication Date: 2022-06-28
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of hardware design, there are certain research results on vulnerability detection technology for chip-level hardware, but the vulnerability detection technology and methods for system-level hardware are very lacking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rapid detection method for multi-dimensional vulnerability of hardware system
  • Rapid detection method for multi-dimensional vulnerability of hardware system
  • Rapid detection method for multi-dimensional vulnerability of hardware system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0159] According to the content of the present invention, we selected several hardware systems from the cloud-pipe-end-terminal part of the IoT architecture, crawled the design information of all experimental hardware systems on the Internet, and constructed the design information of the hardware system through step 2 The data and experimental equipment are shown in Table 1.

[0160] Table 1 Experimental equipment information

[0161]

[0162]

[0163] Subsequently, through step 3, the vulnerability entries in the open source vulnerability database NVD are converted into vulnerability records, and a vulnerability database D is formed.

[0164] Finally, based on our defined vulnerability search algorithm, design data and vulnerability data, we conduct hardware system vulnerability detection. The search results are shown in Table 2.

[0165] As shown in Table 2, our method finds a total of 11 published vulnerabilities in the design information of 4 devices (Redmi Note4x, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a rapid detection method for multi-dimensional vulnerability of a hardware system. The method comprises the following steps: firstly, extracting a hardware system feature set according to the structure of the hardware system; secondly, constructing a hardware system data and vulnerability database based on the hardware system feature set; and finally, finding a vulnerability entry and a hardware system which can be successfully matched through a vulnerability search algorithm to realize multi-dimensional vulnerability detection. According to the method, vulnerability detection can be carried out based on the design document and the vulnerability database of the hardware system, multi-dimensional vulnerability generated by cooperative work of different dimensions in the system is found in the design stage of the hardware system, and the system architecture is supported to be changed in time in the design stage to eliminate the vulnerability. Therefore, the invention provides an effective detection method for the vulnerabilities introduced in the hardware system design, and ensures the security of the hardware system design.

Description

technical field [0001] The invention relates to the field of hardware security, in particular to a fast detection method for multi-dimensional vulnerability of a hardware system. Background technique [0002] As the basic equipment of the Internet, the hardware system can only perform its functions properly only if it can reliably collect, exchange and process data. For a long time, hardware systems are considered to be safe and reliable after being manufactured. However, with the development of information technology, more and more attacks are aimed at hardware systems, so hardware vulnerability analysis methods are urgently needed. [0003] The vulnerability analysis of hardware systems mainly includes three stages: design, testing and operation. However, according to the literature of Bakirtzis G et al., it is known that most of the hardware defects are introduced in the design stage (see "Data-driven vulnerability exp loration for design phase" system analysis", Bakirtz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 杨兆瑞陈哲王坚郭世泽李坤杨鍊
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More