CN107526969B - Method and device for determining IP (Internet protocol) core security level - Google Patents

Method and device for determining IP (Internet protocol) core security level Download PDF

Info

Publication number
CN107526969B
CN107526969B CN201610446930.9A CN201610446930A CN107526969B CN 107526969 B CN107526969 B CN 107526969B CN 201610446930 A CN201610446930 A CN 201610446930A CN 107526969 B CN107526969 B CN 107526969B
Authority
CN
China
Prior art keywords
attribute information
security
core
target
intellectual property
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610446930.9A
Other languages
Chinese (zh)
Other versions
CN107526969A (en
Inventor
李莹
陈锐
陈岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Microelectronics of CAS
Original Assignee
Institute of Microelectronics of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Microelectronics of CAS filed Critical Institute of Microelectronics of CAS
Priority to CN201610446930.9A priority Critical patent/CN107526969B/en
Publication of CN107526969A publication Critical patent/CN107526969A/en
Application granted granted Critical
Publication of CN107526969B publication Critical patent/CN107526969B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a method and a device for determining the security level of an IP core, wherein the method comprises the following steps: acquiring target attribute information of a target IP core, wherein the target attribute information comprises multiple types of attribute information, and the influence degrees of the multiple types of attribute information on the security of the target IP core are different; determining a safety value of target attribute information based on a preset corresponding relation between the attribute information of the IP core and the safety value; and determining the security level of the target IP core based on a preset security classification rule by using the security value of the target attribute information. The method and the device for determining the security level of the IP core can evaluate the security of the IP core, and can improve the security and the reliability of the information computing system with the IP core through the security evaluation of the IP core.

Description

Method and device for determining IP (Internet protocol) core security level
Technical Field
The invention relates to the technical field of chip design and test, in particular to a method and a device for determining the security level of an IP core.
Background
With the development of mobile internet and internet of things, embedded computing systems are widely used in consumer electronics, aerospace, finance and medical fields, and a System on Chip (SoC) is an important component constituting the embedded computing systems.
In order to adapt to application scenarios with larger and larger system scale and more complex functions, a large number of Intellectual Property (IP) core components of a third party are multiplexed in the SoC to improve design efficiency. Design methods based on the IP core multiplexing technology have become the most effective method to make up the gap between design production efficiency and chip density and to quickly enter the market. According to statistics, the number of the IP cores on one SoC can reach hundreds, and the large application of the IP cores greatly shortens the design time of the system on chip and accelerates the marketing of related products.
However, due to the different sources of the IP cores, the application of a large number of IP cores on the SoC increases the risk of the chip undoubtedly, especially for information computing systems sensitive to high security. The information computing system not only requires that the SoC integrating a large number of IP cores from different sources satisfy the correctness of functions, but also should ensure the safety of use thereof. However, in actual design, the test verification environment and the credibility provided by suppliers of different IP cores are different, and although international work on integrated circuit IP design, usability, reusability, quality evaluation and standardization thereof starts from the late 90 s of the last century, relevant standards for IP core security evaluation do not exist at present, and cooperative verification technology and mainstream EDA tools do not have a part specially aiming at security, and only code coverage and functions are verified.
More and more researches show that the use of the non-trusted third party IP may introduce malicious codes or malicious circuits such as hardware trojans and the like, which may directly or indirectly attack the content of the on-chip trusted module or core, may cause different degrees of security information disclosure, even include key and password disclosure of the most core, and the like, and seriously affect the reliability of the whole information system. Therefore, the security evaluation of the IP core is an urgent problem to be solved.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for determining a security level of an IP core, so as to implement security evaluation of the IP core and further improve security and reliability of a computing system using the IP core, and the technical scheme is as follows:
a method of determining an IP core security level, the method comprising:
acquiring target attribute information of a target IP core, wherein the target attribute information comprises multiple types of attribute information, and the influence degrees of the multiple types of attribute information on the security of the target IP core are different;
determining a safety value of the target attribute information based on a preset corresponding relation between the attribute information of the IP core and the safety value;
and determining the security level of the target IP core based on a preset security classification rule by using the security value of the target attribute information.
Wherein the determining, by using the security value of the target attribute information, the security level of the target IP core based on a preset security classification rule includes:
determining the security level of the target IP core based on a preset binary grading rule according to the security value of each attribute information in first-class attribute information in the multiple classes of attribute information, wherein the first-class attribute information presets attribute information with the highest influence degree on the security of the target IP core, and the binary grading rule is a grading rule for dividing the security level of the target IP core into two levels;
or, the security level of the target IP core is determined based on a preset multivariate hierarchical rule by the security value of each attribute information in each type of attribute information in the multiple types of attribute information, where the multivariate hierarchical rule is a hierarchical rule that divides the security level of the target IP core into multiple levels, and the multiple levels are greater than two levels.
Wherein the determining, according to the security value of each attribute information in the first type of attribute information in the multiple types of attribute information, the security level of the target IP core based on a preset binary hierarchical rule includes:
judging whether the security value of at least one attribute information in the first type of attribute information is a first security value or not, and judging whether the security value of at least one attribute information in the first type of attribute information is a second security value or not;
if so, determining the level of the target IP core as a level indicating that the target core is an unsafe IP core;
if not, determining the level of the target IP core as the level indicating that the target IP core is a safe IP core.
Wherein the multi-class attribute information includes: the first type attribute information has a higher influence degree on the security of the target IP core than the second type attribute information, and the second type attribute information has a higher influence degree on the security of the target IP core than the third type attribute information;
determining the security level of the target IP core based on a preset multivariate hierarchical rule by using the security value of each attribute information in each type of attribute information in the multiple types of attribute information, including:
when the security value of at least one attribute information in the first type of attribute information is a first security value, determining that the security level of the target IP core is a first level;
when the security value of each attribute information in the first type of attribute information is not the first security value, and the security values of at least two attribute information in the first type of attribute information are both the second security values, determining that the security level of the target IP core is the second level;
when the security value of each attribute information in the first type of attribute information is not a first security value and only one security value of the attribute information in the first type of attribute information is a second security value, or when the security value of each attribute information in the first type of attribute information is not a first security value nor a second security value and the security value of at least one attribute information in the second type of attribute information is a first security value or a second security value, determining that the security level of the target IP core is a third level;
when the security value of each attribute information in the first type of attribute information and the second type of attribute information is neither a first security value nor a second security value, and the security value of no more than two attribute information in the first attribute information, the second type of attribute information and the third attribute information is a third preset value, determining that the security level of the target IP core is a fourth level;
when the security value of each attribute information in the first attribute information, the second attribute information and the third attribute information is neither a first security value nor a second security value nor a third preset value, determining that the security level of the target IP core is a fifth level;
the security value of the attribute information is that the first security value indicates that the attribute information is the attribute information with the worst security, the attribute information is that the second security value indicates that the attribute information is the attribute information with the second-level security difference, the attribute information is that the third full value indicates that the attribute information is the attribute information with the third-level security difference, the fifth level indicates that the security of the target IP core is the highest, and the security indicated by the fourth level, the third level, the second level, and the first level is gradually reduced.
Wherein the first-type attribute information includes: the obtaining channel of the target IP core, the provider security level of the target IP core and the application field of the target IP core;
the second type attribute information includes: the conformity of the target IP core and the standard, the delivery item of the target IP core, the function information of the target IP core and the working mode of the target IP core;
the third type attribute information is attribute information except the second type attribute information and the third type attribute information in the target attribute information.
An apparatus to determine an IP core security level, the apparatus comprising: the security system comprises an attribute information acquisition module, a security value determination module and a security level determination module;
the attribute information acquisition module is used for acquiring target attribute information of a target IP core, wherein the target attribute information comprises multiple types of attribute information, and the influence degrees of the multiple types of attribute information on the security of the target IP core are different;
the security value determining module is configured to determine, based on a preset correspondence between the attribute information of the IP core and the security value, a security value of the target attribute information acquired by the attribute information acquiring module;
and the security level determining module is used for determining the security level of the target IP core based on a preset security classification rule by using the security value of the target attribute information determined by the security value determining module.
Wherein the security level determination module comprises: a first determination module or a second determination module;
the first determining module is configured to determine, based on a preset binary hierarchical rule, a security level of the target IP core according to a security value of each attribute information in first-class attribute information in the multiple classes of attribute information, where the first-class attribute information is attribute information with a highest influence degree on security of the target IP core in the multiple classes of attribute information, and the binary hierarchical rule is a hierarchical rule that divides the security level of the target IP core into two levels;
the second determining module is configured to determine the security level of the target IP core according to a preset multivariate classification rule based on the security value of each of the various types of attribute information in the multiple types of attribute information, where the multivariate classification rule is a classification rule that divides the security level of the target IP core into multiple stages, and the multiple stages are greater than two stages.
Wherein the first determining module comprises: a judgment submodule and a determination submodule;
the judging submodule is configured to judge whether a security value of at least one piece of attribute information in the first type of attribute information is a first security value and a security value of at least one piece of attribute information is a second security value, where the first security value of the attribute information indicates that the attribute information is the attribute information with the worst security, and the second security value indicates that the attribute information is the attribute information with the second-order poor security;
the determining sub-module is configured to determine, when the determining sub-module determines that the security value of at least one attribute information in the first type of attribute information is a first security value and the security value of at least one attribute information is a second security value, that the level of the target IP core is a level indicating that the target core is an insecure IP core, and otherwise, that the level of the target IP core is a level indicating that the target IP core is a secure IP core.
Wherein the multi-class attribute information includes: the first type attribute information has a higher influence degree on the security of the target IP core than the second type attribute information, and the second type attribute information has a higher influence degree on the security of the target IP core than the third type attribute information;
the second determining module comprises: a first determination submodule, a second determination submodule, a third determination submodule and a fourth determination submodule;
the first determining submodule is configured to determine that the security level of the target IP core is a first level when the security value of at least one piece of attribute information in the first type of attribute information is the first security value;
the second determining sub-module is configured to determine that the security level of the target IP core is a second level when the security value of each attribute information in the first type of attribute information is not the first security value, and the security values of at least two attribute information in the first type of attribute information are both second security values;
the third determining sub-module is configured to determine that the security level of the target IP core is a third level when none of the security values of each of the first type of attribute information is the first security value and only one of the first type of attribute information is the second security value, or when none of the security values of each of the first type of attribute information is the first security value or the second security value and at least one of the second type of attribute information has the first security value or the second security value;
the fourth determining sub-module is configured to determine that the security level of the target IP core is a fourth level when none of the security values of each of the first type of attribute information and the second type of attribute information is the first security value and none of the security values is the second security value, and no more than two of the security values of the first attribute information, the second type of attribute information, and the third attribute information are the third preset values;
the fifth determining sub-module is configured to determine that the security level of the target IP core is a fifth level when none of the security values of each of the first attribute information, the second attribute information, and the third attribute information is the first security value, none of the security values is the second security value, and none of the security values is the third preset value;
the security value of the attribute information is that the first security value indicates that the attribute information is the attribute information with the worst security, the attribute information is that the second security value indicates that the attribute information is the attribute information with the second-level security difference, the attribute information is that the third full value indicates that the attribute information is the attribute information with the third-level security difference, the fifth level indicates that the security of the target IP core is the highest, and the security indicated by the fourth level, the third level, the second level, and the first level is gradually reduced.
Wherein the first-type attribute information includes: the obtaining channel of the target IP core, the provider security level of the target IP core and the application field of the target IP core;
the second type attribute information includes: the conformity of the target IP core and the standard, the delivery item of the target IP core, the function information of the target IP core and the working mode of the target IP core;
the third type attribute information is attribute information except the second type attribute information and the third type attribute information in the target attribute information.
The technical scheme has the following beneficial effects:
the method and the device for determining the security level of the IP core firstly acquire target attribute information of the target IP core, wherein the target attribute information comprises a plurality of types of attribute information which are divided according to the influence degree on the security of the target IP core, then determine the security value of the target attribute information based on the preset corresponding relation between the attribute information of the IP core and the security value, and finally determine the security level of the target IP core based on the preset security classification rule by utilizing the security value of the target attribute information. The method and the device provided by the invention can realize the evaluation of the safety and the reliability of the IP core and the information computing system with the IP core, and can improve the safety and the reliability of the information computing system with the IP core through the safety and the reliability evaluation of the IP core.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for determining a security level of an IP core according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus for determining an IP core security level according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a method for determining a security level of an IP core, please refer to fig. 1, which shows a flowchart of the method, where the method may include:
step S101: and acquiring target attribute information of the target IP core.
The target attribute information comprises multiple types of attribute information, and the multiple types of attribute information are divided according to the influence degree on the security of the target IP core, namely the influence degrees of the multiple types of attribute information on the security of the target IP core are different.
Step S102: and determining a safety value of the target attribute information based on the preset corresponding relation between the attribute information of the IP core and the safety value.
Step S103: and determining the security level of the target IP core based on a preset security classification rule by using the security value of the target attribute information.
The method and the device for determining the security level of the IP core firstly acquire the target attribute information of the target IP core, then determine the security value of the target attribute information based on the preset corresponding relation between the attribute information of the IP core and the security value, and finally determine the security level of the target IP core based on the preset security classification rule by utilizing the security value of the target attribute information. The method for determining the security level of the IP core provided by the embodiment of the invention can evaluate the security of the IP core, and can improve the security and reliability of the information computing system with the IP core through the security evaluation of the IP core.
In the above embodiment, the attribute information of the target IP core may include source information, function information, and usage scenario information of the target IP core.
Further, the source information of the target IP core may include a security level of a provider of the target IP core, a release time of the target IP core, an acquisition channel of the target IP core, a compliance of the target IP core with a standard, and a delivery item of the target IP core.
The security level of the provider of the target IP core is divided into two strategies, wherein the first strategy is a binary strategy, and the second strategy is a multi-element strategy.
Binary policy, i.e., to divide the target IP core provider into trusted (denoted by T) and untrusted (denoted by U). Trusted providers include, among others, autonomous development, closely collaborating shared developers, providers certified by an authoritative third party certification authority, developers in other highly trusted departments. Non-trusted providers include public network download availability, general partners, unauthenticated enterprise developers, unauthenticated individual developers, sensitive entity providers, providers of other unidentified sources.
Multivariate policies, i.e., classifying providers by degree of combined security as fully trusted (denoted by FT), authenticated (denoted by AU), uncertain (denoted by UN), suspected (denoted by PS), and highly suspected (denoted by HS). The completely trusted provider is a common developer which is developed independently and cooperates closely, and is not influenced by any external factors to directly obtain the IP core. The authenticated providers are providers authenticated by an authoritative third party certificate authority and developers of other highly trusted departments, and are influenced by certain external factors, but can still successfully obtain authenticated IP providers (such as business relations). An inexact provider obtains a purportedly authenticated source, a general partner (initial cooperation or indirect cooperation, incomplete authentication process or non-authoritative authentication unit) for the open network download. Providers that may be suspected are publicly available network downloads, but do not claim any certified sources, unauthenticated enterprise developers, unauthenticated individual developers. Providers with high suspicion are providers of sensitive entities (bad records from previous exposure or reported records, sensitive library list members), other unknown sources.
And the release time of the target IP core indicates the formal acquisition time of the target IP core. If the IP core is developed autonomously or developed by close collaborators, the release time of the final version is the standard. IP cores from other sources, which should be provided with IP core release time by the provider and cannot obtain the time stamp, should perform downshift processing at the original safety level even if the IP cores are authenticated.
The acquisition channel of the target IP core indicates the manner in which the IP is acquired, and the attribute should be matched with the provider attribute.
The target IP core conforms to the standard, and the reference standard specification comprises an international VSIA system, a domestic CSIP system and the like, which indicate the specific compliance of which standard and which version of the standard are followed. If not developed to any standard, the compliance with the standard is not compliant.
The delivery items of the target IP core, with reference to the VSIA and CSIP requirements for the delivery items, make provisions for the soft core and hard core, respectively (fixed core reference hard core). Soft core delivery terms are classified into the following categories: document delivery items, system design delivery items, logic design delivery items, test delivery items, functional verification delivery items, code check delivery items, timing and power analysis delivery items. Hard core delivery terms are classified into the following categories: document delivery items, circuit design delivery items, model delivery items, functional verification delivery items, test delivery items, and silicon verification delivery items.
Deliverables are classified into the following categories according to their mandatory type: mandatory (M), Conditional Mandatory (CM), Recommended (R) and Conditional Recommended (CR). The condition is forced to determine CM according to specific application environment, the recommended R can improve design quality and precision and reduce integration time, the condition recommended CR points out the specified condition, and under the condition that the condition is met, the design quality and precision can be improved, the integration time can be reduced, and the like.
Further, the function information of the target IP core includes category information, structure information, function information, performance information, and form information. The class information is used for indicating the type of the IP core and belongs to a hard core, a fixed core or a soft core, the structure information is used for indicating the structure characteristics of the IP core, for example, the digital IP can be divided into bus or non-bus structures, the structure information can indicate the bus type, the function information clearly indicates the function classification of the IP, the performance information indicates all quantifiable indexes of the performance of the IP core, the form information is mostly valid only for the hard core and comprises all results relevant to the process and the final silicon verification, and the soft core only needs to provide the gate number of a synthesizable netlist, the bit number of input data and an address bus and the like.
Further, the usage scenario of the target IP core includes an operation mode, a verification environment, and target location. The working mode is used for indicating the mode classification and definition of the target IP core in actual use, such as master-slave, read-write, full working/sleep, and illustrating the transition conditions between the modes, which can be described by a state machine diagram. The verification environment is used to indicate which external verification conditions are present, which verification files are matched, or which verification reports are already present, indicating the tool version used. The target positioning is used for determining the use field of a target IP core, and can be classified according to security level and divided into a common IP core, a special IP core, a security sensitive field IP core and a non-security sensitive field IP core.
In the above embodiment, the attribute information is divided into multiple classes according to the influence degree on the security of the target IP core, and multiple classes of attribute information are obtained.
In a possible implementation manner, the attribute information of the target IP core may be divided into three types of attribute information, namely, first type attribute information, second type attribute information, and third type attribute information, according to the degree of influence on the security of the target IP core. The first type of attribute information is particularly important attribute information, the second type of attribute information is important attribute information, and the third type of attribute information is general attribute information.
Specifically, the first type of attribute information may include a security level of a provider of the target IP core, an acquisition channel of the target IP core, and an application field of the target IP core, the second type of attribute information may include a standard conformity of the target IP core, a delivery item of the target IP core, a function of the target IP core, a category of the target IP core, and a working mode of the target IP core, and the other attribute information except the above attribute information is the third type of attribute information.
After the target attribute information of the target IP core, namely the multi-class attribute information, is obtained, the safety value of the target attribute information is determined based on the preset corresponding relation between the IP core attribute information and the safety value.
In this embodiment, the correspondence between the IP core attribute information and the security value may be preset as follows:
(one) particularly important attribute information
1. For attribute information "IP core provider level":
for a binary policy, the security value is a if the security level of the IP core provider is trusted (T) and E if the security level of the IP core provider is untrusted (U). For a multi-policy, the security value is a if the security level of the IP core provider is Fully Trusted (FT), B if the security level of the IP core provider is Authenticated (AU), C if the security level of the IP core provider is Uncertain (UN), D if the security level of the IP core provider is suspected (PS), and E if the security level of the IP core provider is Highly Suspected (HS).
2. For attribute information of "acquisition channel of IP core":
if it is self-development (O), the security value is a, if it is purchasing rights (P), the security value is B, if it is obtained from an open environment (F), the security value is D.
3. For attribute information of "target location of IP core":
if the IP is the special IP for the non-security sensitive field, the security value is B, if the IP is the shared IP for the non-security sensitive field, the security value is C, if the IP is the special IP for the security sensitive field, the security value is D, and if the IP is the shared IP for the security sensitive field, the security value is E.
(II) important attribute information:
1. for attribute information of "conformity with standard":
the security value is a if the criterion is completely fulfilled (denoted by TM), B if the criterion is partially fulfilled (denoted by PM) and C if the criterion is not fulfilled (denoted by NM).
2. For attribute information of "delivery item":
and if all the items are complete, the safety value is A, if all the M items and the CM items are complete, the safety value is B, otherwise, the safety value is C.
3. For attribute information of "function of IP core":
if the function of the IP core is a physical standard unit, the security value is A, if the function of the IP core is a processor, the security value is B, if the function of the IP core is a fixed function IP and a common interface IP, the security value is C, if the function of the IP core is an Ethernet/USB/other high-speed interfaces and controllers, the security value is D, and if the function of the IP core is a memory/encryption/decryption or other IP, the security value is E.
4. For attribute information of "IP core class":
if the IP core is a hard core, the security value is A, and if the IP core is a soft core or a fixed core, the security value is B.
5. For attribute information of "operating mode of IP core":
if the master-slave mode is divided, the safety value of the master machine is A, the safety value of the slave machine is B, if the read-write condition is divided, the read-only safety value is A, the write-only safety value is B, the read-write safety value is C, if the working/sleep state is divided, the sleep state exists, the safety value is A, the sleep state does not exist, and the safety value is B.
(III) general Attribute information
For each attribute information in the general attribute information, if there is some attribute information, the security value of the attribute information is B, and if there is no attribute information, the security value is C, for example, if the structure information in the attribute information of the IP core is empty, the security value of the structure information is determined to be C, and if the structure information is not empty, the security value of the structure information is B.
After the target attribute information is obtained, the security value of the target attribute information may be determined based on the correspondence between the attribute information and the security value, and then the security level of the target IP core may be determined based on a preset security classification rule using the security value of the target attribute information.
In this embodiment, there are various implementations of determining the security level of the target IP core based on the preset security classification rule by using the security value of the target attribute information.
In one possible implementation, the security level of the target IP core may be determined based on a preset binary hierarchical rule by a security value of each attribute information in a first type of attribute information (i.e., particularly important attribute information) of the multiple types of attribute information. The binary hierarchical rule is a hierarchical rule which divides the security level of the target IP core into two levels.
Further, the implementation process of determining the security level of the target IP core based on the preset first security classification rule by using the security value of each attribute information in the first attribute information of the multiple types of attribute information may include: and judging whether the security value of at least one attribute information in the first-class attribute information is a first security value and the security value of at least one attribute information is a second security value, if so, determining the level of the target IP core as the level indicating that the target core is an unsafe IP core, otherwise, determining the level of the target IP core as the level indicating that the target IP core is a safe IP core. The first attribute information has at least one attribute information with a security value as a first security value and at least one attribute information with a security value as a second security value, which indicates that at least one attribute information with the worst security and at least one attribute information with the second-order security exist in the first-class attribute information.
Illustratively, the level of the target IP core includes two levels, which are respectively a first level and a second level, the first level indicates that the target IP core is an unsafe IP core, the second level indicates that the target IP core is a safe IP core, the first type of attribute information includes a safety level of a provider of the target IP core, an acquisition channel of the target IP core, and an application field of the target IP core, the first safety value is E, and the second safety value is D:
assuming that the security value of the security level of the target IP core provider is B, the security value of the acquisition channel of the target IP core is D, and the security value of the application field of the target IP core is E, since there is a first security value, i.e., E, of one attribute information in the first type of attribute information and a second security value, i.e., D, of one attribute information, it is determined that the security level of the target IP core is one level, i.e., the target IP core is an insecure IP core. Assuming that the security value of the security level of the target IP core provider is B, the security value of the acquisition channel of the target IP core is C, and the security value of the application field of the target IP core is a, it may be determined that the security level of the target IP core is two-level, that is, the target IP core is a secure IP core. Assuming that the security value of the security level of the target IP core provider is B, the security value of the acquisition channel of the target IP core is E, and the application field of the target IP core is C, the security level of the target IP core can be determined to be two levels, that is, the target IP core is a secure IP core. That is, when D and E appear in the security value of the first-class attribute information of the target IP core at the same time, the target IP core is an unsafe IP core, otherwise, the target IP core is a safe IP core.
In another possible implementation manner, the security level of the target IP core may be determined based on a preset multi-element ranking rule by the security value of each of the various types of attribute information in the multiple types of attribute information. The multivariate hierarchical rule is used for dividing the security level of the target IP core into a plurality of security levels.
Similarly, taking the multi-class attribute information including the first class of attribute information (particularly important attribute information), the second class of attribute information (important attribute information), and the third class of attribute information (general attribute information) as an example, a specific implementation process for determining the security level of the target IP core based on a preset second security classification rule by using the security value of each of the various types of attribute information in the multi-class attribute information will be described:
when the security value of at least one attribute information in the first type of attribute information is a first security value, determining the security level of the target IP core as a level indicating that the target IP core is a highly insecure IP core;
when the security value of each attribute information in the first type of attribute information is not a first security value and the security values of at least two attribute information in the first type of attribute information are second security values, determining the security level of the target IP core as indicating that the target IP core is a less secure IP core level;
when the security value of each attribute information in the first type of attribute information is not a first security value and only one security value of the attribute information in the first type of attribute information is a second security value, or when the security value of each attribute information in the first type of attribute information is not a first security value or a second security value and the security value of at least one attribute information in the second type of attribute information is a first security value or a second security value, determining the security level of the target IP core as a level indicating that the target IP core is a possibly unsafe IP core;
when the security value of each attribute information in the first attribute information and the second attribute information is not a first security value nor a second security value, and the security value of no more than two attribute information in the first attribute information, the second attribute information and the third attribute information is a third preset value, determining the security level of the target IP core as a level indicating that the target IP core is a possible security IP core;
and when the security value of each attribute information in the first attribute information, the second attribute information and the third attribute information is not the first security value, is not the second security value, and is not the third preset value, determining the security level of the target IP core as a level indicating that the target IP core is the security IP core.
The security value of the attribute information is the first security value indicating that the attribute information is the attribute information with the worst security, the attribute information is the second security value indicating that the attribute information is the attribute information with the second-level security difference, and the attribute information is the third full value indicating that the attribute information is the attribute information with the third-level security difference.
Illustratively, the level of the target IP core being the secure IP core is divided into five levels, which are respectively a first level, a second level, a third level, a fourth level and a fifth level, the first level indicates that the target IP core is the highly insecure IP core, the second level indicates that the target IP core is the less insecure IP core, the third level indicates that the target IP core is the possibly insecure IP core, the fourth level indicates that the target IP core is the possibly secure IP core, and the fifth level indicates that the target IP core is the secure IP core, that is, the higher the security level of the target IP core is, the safer the target IP core is, and vice versa, the lower the security level of the target IP core is, the more insec.
Setting the first safety value as E, the second safety value as D, and the third preset value as C:
if the security value of at least one attribute information in the first type of attribute information (particularly important attribute information) is E, the security level of the target IP core may be determined to be one level, i.e., the target IP core is a highly insecure IP core.
If the security value of each attribute information in the first-class attribute information (particularly important attribute information) is not E, and the security value of at least two attribute information is D, the security level of the target IP core can be determined to be two-level, that is, the target IP core is a less-secure IP core.
If the security value of each attribute information in the first type of attribute information (particularly important attribute information) is not E, and only the security value of one attribute information is D, it may be determined that the security level of the target IP core is three levels, that is, the target IP core is a possibly insecure IP core.
If the security value of each attribute information in the first-class attribute information (particularly important attribute information) and the second-class attribute information (important information) is neither E nor D, and the security value of no more than two attribute information in the first-class attribute information (particularly important attribute information), the second-class attribute information (important attribute information) and the third-class attribute information (general attribute information) is C, it may be determined that the security level of the target IP core is four, that is, the target IP core is a possible secure IP core.
If the security value of each attribute information in the first-class attribute information (especially important attribute information), the second-class attribute information (important attribute information) and the third-class attribute information (general attribute information) is neither E, D or C, the level of the target IP core is five, that is, the target IP core is a security IP core.
The following describes a method for determining the security level of an IP core according to an embodiment of the present invention with three specific IP cores as examples:
1、DW_apb_uart
each attribute information of the IP core DW _ apb _ uart and its corresponding security value are shown in the following table:
Figure BDA0001023182470000151
Figure BDA0001023182470000161
the security value conditions of various types of attribute information of the IP core in the table are as follows: the security value of the special important attribute information is A, B, C, the security value of the important attribute information is A, B, B, C, B, the security value of the general attribute information is B, B, B, B, B, and since neither the security values of the special important attribute information nor the second type of attribute information are E nor D, and no more than two security values of all the attribute information are C, the security level of the IP core can be determined to be 4 levels, and the IP core is a possible secure IP core.
2. 128-AES AMBA slave IP core
The attribute information and corresponding security value of the 128-AES AMBA slave IP core are shown in the following table:
Figure BDA0001023182470000171
Figure BDA0001023182470000181
the security value conditions of various types of attribute information of the IP core in the table are as follows: the security value of the important attribute information is A, A, E, the security value of the important attribute information is B, C, B, E, B, and the security value of the general attribute information is B, B, B, B, B, and since the security value of one of the attribute information in the important attribute information is E, it is determined that the security level of the IP core is level 1, and the IP core is a highly insecure IP core.
3、USB2.0IP
USB2.0IP, the respective attribute information and its corresponding security value are shown in the following table:
Figure BDA0001023182470000182
Figure BDA0001023182470000191
the security value conditions of various types of attribute information of the IP core in the table are as follows: the security values of the particularly important attribute information are D, D, C, the security values of the important attribute information are C, C, B, D, B, and the security values of the general attribute information are C, C, B, C, C, respectively, since the security values of the attribute information in the particularly important attribute information and the important attribute information are not E, and the security values of two attribute information in the particularly important attribute information are both D, it is determined that the security level of the IP core is second level, that is, the IP core is a less secure IP core.
Corresponding to the foregoing method, an embodiment of the present invention further provides an apparatus for determining an IP core security level, and referring to fig. 2, a schematic structural diagram of the apparatus is shown, where the apparatus may include: an attribute information acquisition module 201, a security value determination module 202, and a security level determination module 203. Wherein:
an attribute information obtaining module 201, configured to obtain target attribute information of the target IP core.
The target attribute information comprises multiple types of attribute information, the multiple types of attribute information are divided according to the influence degree on the security of the target IP core, and the influence degrees of the multiple types of attribute information in the multiple types of attribute information on the security of the target IP core are different.
A security value determining module 202, configured to determine a security value of the target attribute information acquired by the attribute information acquiring module 201 based on a preset correspondence between the attribute information of the IP core and the security value.
And the security level determining module 203 is configured to determine the security level of the target IP core based on a preset security classification rule by using the security value of the target attribute information determined by the security value determining module 202.
The device for determining the security level of the IP core, provided by the invention, firstly obtains the target attribute information of the target IP core through the attribute information obtaining module, then the security value determining module determines the security value of the target attribute information based on the preset corresponding relation between the attribute information of the IP core and the security value, and finally the security level determining module determines the security level of the target IP core based on the preset security classification rule by utilizing the security value of the target attribute information. The device for determining the security level of the IP core provided by the embodiment of the invention can evaluate the security of the IP core, and can improve the security and reliability of the information computing system with the IP core through the security evaluation of the IP core.
In the apparatus for determining the security level of the IP core provided in the foregoing embodiment, the security level determining module may include: a first determination module or a second determination module.
And the first determining module is used for determining the security level of the target IP core based on a preset binary hierarchical rule through the security value of each attribute information in the first attribute information in the multi-class attribute information. Wherein the binary hierarchical rule is used to divide the security level of the target IP core into two security levels.
The first-class attribute information is attribute information with the highest influence degree on the security of the target IP core in the multi-class attribute information.
And the second determining module is used for determining the security level of the target IP core according to the security value of each attribute information in each type of attribute information in the multi-type attribute information based on the preset multi-element grading rule. The multi-element hierarchical rule is used for dividing the security level of the target IP core into a plurality of security levels, and the plurality of security levels are more than two security levels.
Further, the first determining module comprises: a judgment submodule and a determination submodule. Wherein:
and the judging submodule is used for judging whether the security value of at least one attribute information in the first type of attribute information is a first security value and the security value of at least one attribute information is a second security value.
And the determining submodule is used for determining that the level of the target IP core is the level indicating that the target core is an unsafe IP core when the judging submodule judges that the safety value of at least one attribute information in the first-class attribute information is a first safety value and the safety value of at least one attribute information is a second safety value, and otherwise, determining that the level of the target IP core is the level indicating that the target IP core is a safe IP core. The first attribute information has at least one attribute information with a security value as a first security value and at least one attribute information with a security value as a second security value, which indicates that at least one attribute information with the worst security and at least one attribute information with the second-order security exist in the first-class attribute information.
In one possible implementation, the multiple types of attribute information may include: the first type attribute information has a higher influence degree on the security of the target IP core than the second type attribute information, and the second type attribute information has a higher influence degree on the security of the target IP core than the third type attribute information.
The second determination module may include a first determination submodule, a second determination submodule, a third determination submodule, and a fourth determination submodule. Wherein:
the first determining submodule is configured to determine that the security level of the target IP core is the first level when the security value of at least one piece of attribute information in the first type of attribute information is the first security value.
And the second determining submodule is used for determining the security level of the target IP core as a second level when the security value of each attribute information in the first-class attribute information is not the first security value and the security values of at least two attribute information in the first-class attribute information are second security values.
And a third determining sub-module, configured to determine the security level of the target IP core to be a third level when the security value of each piece of attribute information in the first type of attribute information is not the first security value and only one security value of the first type of attribute information is the second security value, or when the security value of each piece of attribute information in the first type of attribute information is not the first security value nor the second security value and the security value of at least one piece of attribute information in the second type of attribute information is the first security value or the second security value.
A fourth determining sub-module, configured to determine that the security level of the target IP core is a fourth level when the security value of each of the first type of attribute information and the second type of attribute information is neither the first security value nor the second security value, and the security value of no more than two of the first attribute information, the second type of attribute information, and the third attribute information is a third preset value;
and the fifth determining submodule is used for determining the security level of the target IP core as a fifth level when the security value of each attribute information in the first attribute information, the second attribute information and the third attribute information is not the first security value, is not the second security value or is not the third preset value.
Wherein the fifth level indicates that the security of the target IP core is highest, and the security indicated by the fourth level, the third level, the second level and the first level is gradually reduced.
The first type of attribute information may include an acquisition channel of the target IP core, a provider security level of the target IP core, and an application field of the target IP core, the second type of attribute information includes a conformity of the target IP core with a standard, a delivery item of the target IP core, function information of the target IP core, and a working mode of the target IP core, and the third type of attribute information is attribute information of the target IP core except for the second type of attribute information and the third type of attribute information.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
In the several embodiments provided in the present application, it should be understood that the disclosed method, apparatus, and device may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (4)

1. A method of determining a security level of an IP core for intellectual property, the method comprising:
acquiring target attribute information of a target intellectual property IP core, wherein the target attribute information comprises multiple types of attribute information, and the influence degrees of various types of attribute information in the multiple types of attribute information on the safety of the target intellectual property IP core are different, wherein the attribute information of the target intellectual property IP core comprises source information, functional information and use scene information of the target intellectual property IP core, and the source information of the target intellectual property IP core comprises the safety level of a provider of the target intellectual property IP core, the release time of the target intellectual property IP core, an acquisition channel of the target intellectual property IP core, the conformity of the target intellectual property IP core and a standard and a delivery item of the target intellectual property IP core;
determining a safety value of the target attribute information based on a preset corresponding relation between the attribute information of the intellectual property IP core and the safety value;
determining the security level of the target intellectual property IP core based on a preset security classification rule by using the security value of the target attribute information, wherein the method comprises the following steps:
determining the security level of the target intellectual property IP core based on a preset binary grading rule according to the security value of each attribute information in the first attribute information in the multiple types of attribute information, wherein the first attribute information presets the attribute information with the highest influence degree on the security of the target intellectual property IP core, and the binary grading rule is a grading rule for dividing the security level of the target intellectual property IP core into two levels;
or, determining the security level of the target intellectual property IP core according to the security value of each attribute information in each type of attribute information in the multi-type attribute information based on a preset multi-element grading rule, wherein the multi-element grading rule is a grading rule for dividing the security level of the target intellectual property IP core into multiple stages, and the multiple stages are more than two stages;
wherein, the determining the security level of the target intellectual property IP core based on the preset binary hierarchical rule by the security value of each attribute information in the first attribute information of the multiple types of attribute information includes:
judging whether at least one attribute information security value is a first security value and at least one attribute information security value is a second security value in the first type of attribute information, wherein the attribute information security value is the attribute information with the worst security indicated by the first security value, and the attribute information is the attribute information with the second security value indicated by the second security value;
if so, determining the level of the target intellectual property IP core as the level indicating that the target intellectual property IP core is an unsafe intellectual property IP core;
if not, determining the level of the target intellectual property IP core as the level indicating that the target intellectual property IP core is a safe intellectual property IP core;
or the like, or, alternatively,
the multi-class attribute information includes: the first type attribute information has a higher influence degree on the security of the target intellectual property IP core than the second type attribute information, and the second type attribute information has a higher influence degree on the security of the target intellectual property IP core than the third type attribute information;
determining the security level of the target intellectual property IP core based on a preset multivariate hierarchical rule by the security value of each of the various types of attribute information in the multiple types of attribute information, including:
when the security value of at least one attribute information in the first type of attribute information is a first security value, determining that the security level of the target intellectual property IP core is a first level;
when the security value of each attribute information in the first type of attribute information is not the first security value, and the security values of at least two attribute information in the first type of attribute information are both the second security values, determining that the security level of the target intellectual property IP core is the second level;
when the security value of each attribute information in the first type of attribute information is not a first security value and only one security value of the attribute information in the first type of attribute information is a second security value, or when the security value of each attribute information in the first type of attribute information is not a first security value nor a second security value and the security value of at least one attribute information in the second type of attribute information is a first security value or a second security value, determining the security level of the target intellectual property IP core to be a third level;
when the security value of each attribute information in the first type of attribute information and the second type of attribute information is neither a first security value nor a second security value, and the security value of no more than two attribute information in the first type of attribute information, the second type of attribute information and the third type of attribute information is a third preset value, determining that the security level of the target intellectual property IP core is a fourth level;
when the security value of each attribute information in the first type attribute information, the second type attribute information and the third type attribute information is neither a first security value nor a second security value nor a third preset value, determining that the security level of the target intellectual property IP core is a fifth level;
the security value of the attribute information is that the first security value indicates that the attribute information is the attribute information with the worst security, the attribute information is that the second security value indicates that the attribute information is the attribute information with the second-level security, the attribute information is that the third security value indicates that the attribute information is the attribute information with the third-level security, the fifth level indicates that the security of the target intellectual property IP core is the highest, and the security indicated by the fourth level, the third level, the second level, and the first level is gradually reduced.
2. The method according to claim 1, wherein the first type of attribute information comprises: the obtaining channel of the target intellectual property IP core, the provider security level of the target intellectual property IP core and the application field of the target intellectual property IP core;
the second type attribute information includes: the conformity of the target intellectual property IP core and the standard, the delivery item of the target intellectual property IP core, the functional information of the target intellectual property IP core and the working mode of the target intellectual property IP core;
the third type attribute information is attribute information except the second type attribute information and the third type attribute information in the target attribute information.
3. An apparatus for determining a security level of an IP core for intellectual property, the apparatus comprising: the security system comprises an attribute information acquisition module, a security value determination module and a security level determination module;
the attribute information acquisition module is used for acquiring target attribute information of a target intellectual property IP core, wherein the target attribute information comprises multiple types of attribute information, and the influence degrees of the multiple types of attribute information in the multiple types of attribute information on the safety of the target intellectual property IP core are different, wherein the attribute information of the target intellectual property IP core comprises source information, function information and use scene information of the target intellectual property IP core, and the source information of the target intellectual property IP core comprises the safety level of a provider of the target intellectual property IP core, the release time of the target intellectual property IP core, an acquisition channel of the target intellectual property IP core, the conformity of the target intellectual property IP core and a standard and the delivery items of the target intellectual property IP core;
the security value determining module is used for determining the security value of the target attribute information acquired by the attribute information acquiring module based on the preset corresponding relation between the attribute information of the intellectual property IP core and the security value;
the security level determining module is configured to determine, based on a preset security classification rule, a security level of the target intellectual property IP core by using the security value of the target attribute information determined by the security value determining module, where the security level determining module includes: a first determination module or a second determination module;
the first determining module is configured to determine, based on a preset binary hierarchical rule, a security level of the target intellectual property IP core according to a security value of each attribute information in first-class attribute information in the multiple classes of attribute information, where the first-class attribute information is attribute information with a highest influence degree on the security of the target intellectual property IP core in the multiple classes of attribute information, and the binary hierarchical rule is a hierarchical rule that divides the security level of the target intellectual property IP core into two levels;
the second determining module is configured to determine the security level of the target intellectual property IP core according to a preset multivariate hierarchical rule based on the security value of each of the various types of attribute information in the multiple types of attribute information, where the multivariate hierarchical rule is a hierarchical rule that divides the security level of the target intellectual property IP core into multiple levels, and the multiple levels are greater than two levels;
wherein the first determining module comprises: a judgment submodule and a determination submodule;
the judging submodule is configured to judge whether a security value of at least one piece of attribute information in the first type of attribute information is a first security value and a security value of at least one piece of attribute information is a second security value, where the first security value of the attribute information indicates that the attribute information is the attribute information with the worst security, and the second security value indicates that the attribute information is the attribute information with the second-order poor security;
the determining sub-module is configured to determine, when the determining sub-module determines that the security value of at least one attribute information in the first type of attribute information is a first security value and the security value of at least one attribute information is a second security value, that the level of the target intellectual property IP core is a level indicating that the target intellectual property IP core is an unsafe intellectual property IP core, and otherwise, that the level of the target intellectual property IP core is a level indicating that the target intellectual property IP core is a safe intellectual property IP core;
or the like, or, alternatively,
the multi-class attribute information includes: the first type attribute information has a higher influence degree on the security of the target intellectual property IP core than the second type attribute information, and the second type attribute information has a higher influence degree on the security of the target intellectual property IP core than the third type attribute information;
the second determining module comprises: a first determination submodule, a second determination submodule, a third determination submodule, a fourth determination submodule and a fifth determination submodule;
the first determining sub-module is configured to determine, when the security value of at least one of the first type of attribute information is a first security value, that the security level of the target intellectual property IP core is a first level;
the second determining sub-module is configured to determine that the security level of the target intellectual property IP core is a second level when the security value of each attribute information in the first type of attribute information is not the first security value and the security values of at least two attribute information in the first type of attribute information are both second security values;
the third determining sub-module is configured to determine the security level of the target intellectual property IP core to be a third level when none of the security values of each of the first type of attribute information is the first security value and only one of the first type of attribute information is the second security value, or when none of the security values of each of the first type of attribute information is the first security value or the second security value and at least one of the second type of attribute information has the first security value or the second security value;
the fourth determining sub-module is configured to determine that the security level of the target intellectual property IP core is a fourth level when the security value of each of the first type attribute information and the second type attribute information is neither the first security value nor the second security value, and the security values of no more than two of the first type attribute information, the second type attribute information, and the third type attribute information are third preset values;
the fifth determining sub-module is configured to determine that the security level of the target intellectual property IP core is a fifth level when none of the security values of each of the first type of attribute information, the second type of attribute information, and the third type of attribute information is the first security value, none of the security values is the second security value, and none of the security values is the third preset value.
4. The apparatus according to claim 3, wherein the first type of attribute information comprises: the obtaining channel of the target intellectual property IP core, the provider security level of the target intellectual property IP core and the application field of the target intellectual property IP core;
the third type attribute information is attribute information except the second type attribute information and the third type attribute information in the target attribute information.
CN201610446930.9A 2016-06-20 2016-06-20 Method and device for determining IP (Internet protocol) core security level Active CN107526969B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610446930.9A CN107526969B (en) 2016-06-20 2016-06-20 Method and device for determining IP (Internet protocol) core security level

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610446930.9A CN107526969B (en) 2016-06-20 2016-06-20 Method and device for determining IP (Internet protocol) core security level

Publications (2)

Publication Number Publication Date
CN107526969A CN107526969A (en) 2017-12-29
CN107526969B true CN107526969B (en) 2020-11-03

Family

ID=60734648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610446930.9A Active CN107526969B (en) 2016-06-20 2016-06-20 Method and device for determining IP (Internet protocol) core security level

Country Status (1)

Country Link
CN (1) CN107526969B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110069374A (en) * 2019-04-28 2019-07-30 中国科学院微电子研究所 A kind of method for testing security and device
CN111880768B (en) * 2020-07-23 2023-07-14 北京计算机技术及应用研究所 IP core code level security requirement description method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763453B (en) * 2010-01-22 2011-11-23 工业和信息化部软件与集成电路促进中心 Standardized IP core evaluating method and system
US8972995B2 (en) * 2010-08-06 2015-03-03 Sonics, Inc. Apparatus and methods to concurrently perform per-thread as well as per-tag memory access scheduling within a thread and across two or more threads
CN102110220B (en) * 2011-02-14 2013-01-23 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device
CN103117853B (en) * 2011-11-16 2016-05-18 航天信息股份有限公司 A kind of safe storage device account input and authentication method
CN104767876A (en) * 2015-03-03 2015-07-08 中国联合网络通信集团有限公司 Safety software processing method and user terminal

Also Published As

Publication number Publication date
CN107526969A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
US11405400B2 (en) Hardening based on access capability exercise sufficiency
US11704431B2 (en) Data security classification sampling and labeling
US7870381B2 (en) Schema-based portal architecture for assessment and integration of silicon IPs
Mazzoleni et al. XACML policy integration algorithms
US20120005720A1 (en) Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches
Bhatt et al. ABAC with group attributes and attribute hierarchies utilizing the policy machine
Sun et al. Defining security requirements with the common criteria: Applications, adoptions, and challenges
Julisch Security compliance: the next frontier in security research
Gallo et al. Security and system architecture: Comparison of Android customizations
Amthor et al. Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems
Guttman et al. Information flow in operating systems: Eager formal methods
Francined Herrera-Cubides et al. Security aspects in web of data based on trust principles. A brief of literature review
CN107526969B (en) Method and device for determining IP (Internet protocol) core security level
Jaeger et al. Resolving constraint conflicts
Rauter et al. Privilege-based remote attestation: Towards integrity assurance for lightweight clients
Pannetrat et al. D2. 1: Security-aware SLA specification language and cloud security dependency model
US11575499B2 (en) Self auditing blockchain
Hu et al. Property verification for generic access control models
Speiser Policy of composition? composition of policies
El Hadj et al. Formal approach to detect and resolve anomalies while clustering ABAC policies
Zafar et al. Security quality model: an extension of Dromey’s model
Li Computer security issues and legal system based on cloud computing
Butler et al. Measurement and prediction of access control policy evaluation performance
Hansson et al. Model-based verification of security and non-functional behavior using AADL
Crampton et al. Policy-based access control from numerical evidence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant