WO2022104731A1 - 异构系统的安全防护方法、装置及处理器 - Google Patents
异构系统的安全防护方法、装置及处理器 Download PDFInfo
- Publication number
- WO2022104731A1 WO2022104731A1 PCT/CN2020/130574 CN2020130574W WO2022104731A1 WO 2022104731 A1 WO2022104731 A1 WO 2022104731A1 CN 2020130574 W CN2020130574 W CN 2020130574W WO 2022104731 A1 WO2022104731 A1 WO 2022104731A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- configuration file
- unclonable function
- physical unclonable
- function circuit
- processor
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013507 mapping Methods 0.000 claims abstract description 47
- 230000004044 response Effects 0.000 claims abstract description 24
- 230000006870 function Effects 0.000 claims description 176
- 230000002159 abnormal effect Effects 0.000 claims description 16
- 238000013461 design Methods 0.000 claims description 15
- 230000015572 biosynthetic process Effects 0.000 claims description 13
- 238000003786 synthesis reaction Methods 0.000 claims description 13
- 238000001514 detection method Methods 0.000 claims description 4
- 230000005284 excitation Effects 0.000 abstract description 14
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 238000013473 artificial intelligence Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Definitions
- the invention relates to the technical field of information security, and in particular, to a security protection method, device and processor of a heterogeneous system.
- the Physical Unclonable Function came into being.
- the Physical Unclonable Function is a hardware function implementation circuit that depends on the characteristics of the chip. It has uniqueness and randomness. The deviation of the process parameters can realize the unique function of the excitation signal and the response signal.
- criminals attack the system by modeling the PUF and establishing the PUF model based on the used CRP (Challenge Response Pair, stimulus response pair), which makes the system security not high.
- the present invention aims to solve one of the technical problems in the related art at least to a certain extent. Therefore, the first purpose of the present invention is to propose a security protection method for a heterogeneous system, when an external attack is detected, the physical unclonable function is reconstructed, so that the attacker cannot reconstruct the physical unclonable function after the reconstruction. Circuits are modeled to improve the safety of the system.
- a second object of the present invention is to provide a computer-readable storage medium.
- the third object of the present invention is to provide an electronic device.
- the fourth object of the present invention is to provide a safety protection device for heterogeneous systems.
- a fifth object of the present invention is to propose a processor.
- an embodiment of the first aspect of the present invention proposes a security protection method for a heterogeneous system.
- the heterogeneous system includes a processor, the processor includes a first area, and the first area includes a physical unclonable function circuit.
- a configuration file is obtained, wherein the obtained configuration file is different from the configuration file of the running physical unclonable function circuit;
- mapping relationship of the physical unclonable function circuit is reconstructed on the processor according to the obtained configuration file.
- the configuration file when an external attack is detected on the heterogeneous system, the configuration file is re-acquired, and the obtained configuration file is different from the configuration file of the running physical unclonable function.
- the configuration file reconstructs the mapping relationship of the physical unclonable function on the processor.
- the mapping relationship of the reconstructed physical unclonable function is different from the mapping relationship of the original physical unclonable function. Therefore, even if the same stimulus is input, the two generated It also responds differently, so that the attacker cannot model the reconstructed physical unclonable function circuit, which improves the security of the system.
- the embodiment of the second aspect of the present invention provides a computer-readable storage medium on which a security protection program of a heterogeneous system is stored, and the security protection program of the heterogeneous system is executed by a processor.
- the computer-readable storage medium of the embodiment of the present invention through the aforementioned security protection method for heterogeneous systems, when it is detected that the heterogeneous system is attacked from outside, the physical unclonable function circuit is reconstructed, and the attacker cannot The physical unclonable function circuit is modeled, which improves the security of the system.
- an embodiment of the third aspect of the present invention provides an electronic device, including a memory, a processor, and a security protection program for a heterogeneous system stored in the memory and running on the processor, the processor executing When the security protection program is used, the security protection method of the aforementioned heterogeneous system is realized.
- the electronic device of the embodiment of the present invention through the aforementioned security protection method for a heterogeneous system, when it is detected that the heterogeneous system is attacked by an external, the physical unclonable function circuit is reconstructed, and the attacker cannot make the reconstructed physical unclonable function circuit.
- the function circuit is modeled, which improves the security of the system.
- a fourth aspect of the present invention provides a security protection device for a heterogeneous system.
- the heterogeneous system includes a processor, the processor includes a first area, and the first area includes a physical unclonable function circuit.
- Guards include:
- the detection module is used to detect whether the input of the heterogeneous system is abnormal
- an acquisition module configured to acquire a configuration file when the input of the heterogeneous system is abnormal, and the acquired configuration file is different from the configuration file of the running physical unclonable function circuit;
- the reconstruction module is used to reconstruct the mapping relationship of the physical unclonable function circuit on the processor according to the obtained configuration file.
- the security protection device for a heterogeneous system when an external attack is detected on the heterogeneous system, the physical unclonable function circuit is reconstructed, and the attacker cannot model the reconstructed physical unclonable function circuit. Improve the security of the system.
- a fifth aspect of the present invention provides a processor, including:
- the programmable logic part includes a first area, and the first area includes a physical unclonable function circuit;
- the detector is used to detect whether the processor is attacked
- the operation part is used to obtain a configuration file when the processor is attacked, and reconstruct the mapping relationship of the physical unclonable function circuit in the programmable logic part according to the obtained configuration file, wherein the obtained configuration file Different from the configuration file of the running physical unclonable function circuit.
- the processor of the embodiment of the present invention when it is detected that the heterogeneous system is attacked from the outside, the physical unclonable function circuit is reconstructed, and the attacker cannot model the reconstructed physical unclonable function circuit, which improves the security of the system sex.
- FIG. 1 is a schematic block diagram of a heterogeneous system according to an embodiment of the present invention.
- FIG. 2 is a flowchart of a security protection method for a heterogeneous system according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of a partition of a processor according to an embodiment of the present invention.
- FIG. 4 is a schematic block diagram of a physical unclonable function circuit based on time-averaged frequency pulse direct synthesis of a processor according to an embodiment of the present invention
- FIG. 5 is a schematic diagram of the working principle of a time-averaged frequency-based direct pulse synthesizer according to an embodiment of the present invention
- FIG. 6 is a Hamming distance statistical diagram before and after reconstruction of a physical unclonable function circuit based on time-averaged frequency pulse direct synthesis of a processor according to an embodiment of the present invention
- FIG. 7 is a flowchart of a security protection method for a heterogeneous system according to a specific embodiment of the present invention.
- FIG. 8 is a schematic block diagram of a safety protection device of a heterogeneous system according to an embodiment of the present invention.
- FIG. 9 is a block diagram of a processor according to an embodiment of the present invention.
- a heterogeneous system includes a processor for running a physically unclonable function circuit.
- the processor may be a programmable logic array (Field Programmable Gate Array, FPGA).
- FPGA Field Programmable Gate Array
- the heterogeneous system also includes a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), and a digital signal processing unit (Digital Signal Process, DSP), which are used to meet different requirements under the Internet of Everything.
- CPU Central Processing Unit
- GPU Graphics Processing Unit
- DSP Digital Signal Process
- FPGA includes programmable logic part (Programmable Logic, PL) and program system (Process System, PS) part.
- the PL part includes a first area, and the first area includes a physical unclonable function circuit.
- the security protection methods for heterogeneous systems include:
- Step S100 detecting whether the input of the heterogeneous system is abnormal.
- Heterogeneous systems include detectors, such as AI (Artificial Intelligence) detectors, which are used to detect whether the input of the system is abnormal.
- AI Artificial Intelligence
- the physical unclonable function circuit configured in the first area of the PL part of the FPGA starts to work.
- the AI detector detects in real time whether there is an external attack on the system, such as whether the discarded CRP has been used for multiple application verifications, whether the heterogeneous system software detects external access, and whether the temperature and temperature of the heterogeneous system are detected.
- the physical parameters such as voltage are abnormally jittered, etc., if the above conditions exist, it can be determined that the input of the heterogeneous system is abnormal, that is, the heterogeneous system encounters an external attack.
- Step S200 when an abnormal input of the heterogeneous system is detected, obtain a configuration file, wherein the obtained configuration file is different from the configuration file of the running physical unclonable function circuit.
- Configuration files are used to configure the device placement and routing of physically unclonable function circuits in the FPGA.
- the FPGA erases the running physical unclonable function circuit and re-acquires the configuration file.
- the obtained configuration file is different from the configuration file of the running physical unclonable function circuit, so that the Refactoring Physically Unclonable Function Circuits in .
- obtaining the configuration file includes: obtaining a pre-stored configuration file, wherein the obtained pre-stored configuration file is different from the configuration file of the running physical unclonable function circuit.
- a plurality of different configuration files are pre-stored in the storage module of the heterogeneous system, so that when the heterogeneous system is attacked, a new configuration file can be obtained, and the physical inaccessibility of different layouts can be reconstructed according to the new configuration file. Clone function circuit.
- acquiring the configuration file includes: regenerating the configuration file, and the regenerated configuration file is different from the configuration file of the running physical unclonable function circuit.
- the system can directly generate configuration files, and use the regenerated configuration files to build a physical unclonable function circuit in the FPGA, so that the attacker cannot Unclonable function circuits are used for traversal attacks, thereby improving the security of heterogeneous systems.
- Step S300 reconstruct the mapping relationship of the physical unclonable function circuit on the FPGA according to the obtained configuration file.
- mapping relationship includes the relationship between the excitation and response of the physical unclonable function circuit, and the mapping relationship can be specifically expressed as:
- c is the abbreviation of challenge, which represents incentive, that is, the verification code sent by the user or the requester
- r is the abbreviation of response, that is, the response generated by the verification party according to the incentive
- f() reflects the mapping relationship.
- Different physical unclonable functions have different process deviations and different mapping relationships.
- the FPGA can read the configuration file and select an area according to the configuration file to layout and connect the logic elements of the selected area to reconstruct the mapping relationship of the physical unclonable function circuit.
- the configuration file is re-acquired, and the obtained configuration file is different from the configuration file of the running physical unclonable function. Reconstruct the mapping relationship of the physical unclonable function.
- the mapping relationship of the reconstructed physical unclonable function is different from the mapping relationship of the original physical unclonable function. Therefore, even if the same stimulus is input, the responses generated by the two are different, which makes the attack.
- the author cannot model the reconstructed physical unclonable function circuit, which improves the security of the system.
- reconstructing the mapping relationship of the physical unclonable function circuit in different layouts on the processor according to the acquired configuration file includes: compiling the physical unclonable function circuit according to the acquired configuration file and then re-creating the physical unclonable function circuit. Design; store the result of the design to the processor to reconstruct the mapping of the physical unclonable function circuit.
- redesigning the physical unclonable function circuit after compiling refers to designing the layout and wiring method of the physical unclonable function circuit, and storing the design result on the processor, so that the reconstructed physical unclonable function circuit can be stored on the processor.
- storing the result of the design to the processor to reconstruct the mapping relationship of the physical unclonable function circuit includes: storing the result of the design in the first area of the processor or different from the first area to reconstruct the mapping relationship of the physical unclonable function circuit.
- the present application can not only run the reconstructed physical unclonable function circuit in the first region where the original physical unclonable function circuit runs, but also run the reconstructed physical unclonable function circuit in the second region different from the first region.
- the cloned function circuit and even other areas can also run the reconstructed physical unclonable function circuit, as long as the reconstructed physical unclonable function circuit has a different design from the original physical unclonable function circuit, that is, the layout and wiring methods are different. .
- FPGA includes PS part and PL part.
- the PS part is used to complete software algorithms or special control, and there is a real-time operating system in it, while the PL part is used for programmable logic, which can implement different logic circuits or operations on the PL.
- both the first region and the second region are located in the PL portion.
- the physical unclonable function circuit can be implemented in the FPGA with less overhead.
- the first area and the second area can be set in the PL part, and the physical unclonable function circuit can be partially reconfigurable in the first area of the PL. Or run on a second zone or other zone.
- the size of the physical unclonable function circuit can be designed according to the requirements.
- Table 1 The relationship between the excitation of the physical unclonable function circuit and the excitation-response pair generated according to the excitation can be referred to as shown in Table 1:
- the areas of the first region and the second region are both larger than the physical unclonable function circuit.
- the area of the first region and the second region can be designed to be no less than 1.5 times the area occupied by the physical unclonable function circuit, so as to provide sufficient space margin for the reconstructed physical unclonable function .
- the security protection method of the above heterogeneous system can be reconstructed in the first area running the original physical unclonable function circuit, or in the second area or even other areas different from the first area, so that it can be used for processing.
- the controller provides unlimited stimulus-response pairs, making it impossible for external attackers to conduct modeling or traversal attacks, improving the security of heterogeneous systems.
- the first area or the second area can be configured with an infinite variety of physical unclonable function circuits of different structures, and furthermore, with a smaller
- the overhead realizes the reconstruction of the physical unclonable function circuit of various structures, which can reduce the cost.
- the physical unclonable function circuit is a physical unclonable function circuit (Time-Average-Frequency Direct Period Synthesis Physical Unclonable Function, TAF-DPS-PUF) based on time-averaged frequency pulse direct synthesis.
- TAF-DPS-PUF can construct a mapping relationship according to the following steps: extract the first parameters through the symmetrical first time-averaged frequency-based pulse direct synthesizer and the second time-averaged frequency-based pulse direct synthesizer, respectively, to generate corresponding features A bit stream; a mapping relationship is constructed according to the delay characteristics of the output characteristic bit streams of the first time-averaged frequency pulse direct synthesizer and the second time-averaged frequency pulse direct synthesizer.
- the physical unclonable function circuit based on time-averaged frequency pulse direct synthesis includes a symmetrical first time-averaged frequency-based pulse direct synthesizer 310 and a second time-averaged frequency-based pulse direct synthesizer 320, Trigger 330.
- TAF-DPS time-averaged frequency pulse direct synthesizer
- the two time periods can be synthesized through the period synthesis technique to obtain a clock signal whose period is the target period, and the target period T TAF can satisfy:
- T TAF (1-r)*TA+r*TB Formula (3)
- T TAF (I+r)* ⁇ Formula (4)
- r can control the probability of TB occurrence, that is, the switching frequency between the control period TA and TB.
- the frequency f TAF of the clock signal output by the TAF-DPS frequency synthesizer can be further calculated as:
- the TAF-DPS frequency synthesizer can generate any frequency given a sufficient number of bits in r in the control word F.
- the first time-averaged frequency pulse direct synthesizer 310 and the second time-averaged frequency pulse synthesizer 320 have the same type, quantity and layout of logic units, and both form a delay path with the same structure.
- the physical unclonable function circuit based on time-averaged frequency pulse direct synthesis further includes an oscillator 340 and a control module 350.
- the oscillator 340 is connected to the first time-averaged frequency-based direct pulse synthesizer 310 and the second time-averaged frequency-based direct pulse synthesizer 320.
- the control module 350 connects the oscillator 330 with the first time-averaged frequency-based pulse direct synthesizer 310 and the second time-averaged frequency-based pulse direct synthesizer 320, for controlling the oscillator 330 to the first time-averaged frequency-based pulse direct synthesizer 310 and the second time-averaged frequency-based pulse direct synthesizer 320 input the same initial pulse frequency, and the control module 330 is also configured to input the same initial pulse frequency to the first time-averaged frequency-based pulse direct synthesizer 310 and the second time-averaged frequency-based pulse direct synthesizer 320 Enter the control word.
- the same input signal (ie, excitation) is input to the symmetrical first time-averaged frequency-based pulse direct synthesizer 310 and the second time-averaged frequency-based pulse direct synthesizer 320, the first time-averaged frequency-based pulse direct
- the time-averaged frequency pulse synthesizer 320 is used to extract the first parameter, that is, the process deviation of the extraction circuit, and digitally convert it into a characteristic bit stream.
- the flip-flop 330 compares the first direct synthesizer based on time-averaged frequency pulse with the first 2. Based on the delay of the characteristic bit stream output by the time-averaged frequency pulse synthesizer, and the output response, the mapping relationship can be constructed by the physical unclonable function circuit directly synthesized by the time-averaged frequency pulse.
- Fig. 6 is the Hamming distance statistic diagram of the reconstructed physical unclonable function circuit based on the direct synthesis of time-averaged frequency pulses and the physical unclonable function circuit based on the direct synthesis of time-averaged frequency pulses before reconstruction, the horizontal axis is Hamming Distance, the vertical axis is the number of bits of response, and the calculation formula of Hamming distance is as follows:
- HDRC is the Hamming distance of the response generated when the same excitation is input to the physical unclonable function circuit directly synthesized based on the time-averaged frequency pulse after reconstruction and before reconstruction
- FFB(F, SADR)nA is the basis before reconstruction
- the response of the physical unclonable function circuit directly synthesized by the time-averaged frequency pulse, FFB(F, SADR)nB is the response of the physical unclonable function circuit directly synthesized based on the time-averaged frequency pulse after reconstruction, and l is the bit length of the response.
- FIG. 7 is a security protection method for a heterogeneous system provided by a specific embodiment of the present application.
- the FPGA reads the configuration file from the FLASH or other storage modules, and stores the A physical unclonable function circuit is configured in an area, the physical unclonable function circuit starts to work, and the system detects whether the external input is normal in real time. If yes, then the physical unclonable function circuit generates the corresponding output according to the excitation. If an external input abnormality is detected, a new configuration file is obtained. The new configuration file is different from the configuration file of the running physical unclonable function circuit.
- the new configuration file in the first area or the second area different from the first area Regions reconstruct physically unclonable function circuits with different layout layouts. In this way an infinite number of virtual stimulus-response pairs can be provided for the entire system.
- the excitation-response pair of a physical unclonable function circuit is limited, but when it is attacked, reconstruction is equivalent to virtual expansion of its excitation-response pair.
- This method can not only provide higher security for heterogeneous systems It also has the characteristics of low power consumption and low cost. This method can effectively deal with brute force attacks by criminals and improve the security and life cycle of products.
- the dynamic heterogeneous security system based on the physical unclonable function circuit directly synthesized by the time-averaged frequency pulse can self-adjust and configure itself when attacked, and realize the dynamic reconstruction of hardware security primitives, thereby enhancing the security of the system.
- the method can not only increase the safety level, but also effectively prolong the product life cycle.
- FIG. 8 another embodiment of the present application provides a security protection device for a heterogeneous system, wherein the heterogeneous system includes a processor, the processor includes a first area, and the first area runs a physical unclonable system A functional circuit, the safety protection device includes: a detection module 110 , an acquisition module 120 and a reconstruction module 130 .
- the detection module 110 is used to detect whether the input of the heterogeneous system is abnormal, and the acquisition module 120 is used to obtain a configuration file when the input of the heterogeneous system is abnormal, and the obtained configuration file is different from the configuration of the running physical unclonable function circuit file, the reconstruction module 130 is configured to reconstruct the mapping relationship of the physical unclonable function circuit on the processor according to the acquired configuration file.
- the aforementioned security protection device for heterogeneous systems through the aforementioned security protection method, re-acquires a configuration file when detecting that the heterogeneous system is attacked from outside, and reconstructs the mapping relationship of physical unclonable functions on the processor according to the obtained configuration file, Since the mapping relationship of the reconstructed physical unclonable function is different from the mapping relationship of the original physical unclonable function, even if the same stimulus is input, the responses generated by the two are different, so that the attacker cannot attack the reconstructed physical unclonable function.
- the clone function circuit is modeled, which improves the security of the system.
- FIG. 9 another embodiment of the present application provides a processor including a programmable logic part 210 , a detector 220 and an operation part 230 .
- the processor may be an FPGA.
- the programmable logic part 210 includes a first area, and the first area runs a physical unclonable function circuit.
- the detector 220 is used to detect whether the FPGA is attacked.
- the operation unit 230 is configured to obtain a configuration file when the FPGA is attacked, and reconstruct the mapping relationship of the physical unclonable function circuit in the programmable logic unit 210 according to the obtained configuration file, wherein the obtained configuration file is different from the running physical configuration file. Configuration files for unclonable function circuits.
- the control unit 230 when the detector 220 detects an external attack, the control unit 230 obtains the configuration file again, and reconstructs the mapping relationship of the physical unclonable function on the programmable logic unit 210 according to the obtained configuration file.
- the mapping relationship of the constructed physical unclonable function is different from the mapping relationship of the original physical unclonable function. Therefore, even if the same stimulus is input, the responses generated by the two are different, which can resist external attackers through the original physical unclonable function.
- the function circuit modeling attacks the processor and improves the security of the system.
- the operation unit 230 is further configured to compile and redesign the physical unclonable function circuit according to the acquired configuration file, and store the design result in the programmable logic unit, so as to reconstruct the physical unclonable function circuit mapping relationship.
- the operation part 230 is used to store the design result in the first area of the programmable logic part or the second area different from the first area, so as to reconstruct the physical unclonable function circuit. It can be understood that, in addition to running the physical unclonable function circuit, the programmable logic unit 210 can also run logic circuits with other functions at the same time.
- the areas of the first region and the second region are not smaller than the area of the physical unclonable function circuit.
- the areas of both the first region and the second region are not less than 1.5 times the area occupied by the physical unclonable function circuit, so that the first region or the second region can provide sufficient space for the reconstruction of the physical unclonable function circuit. space margin.
- the physical unclonable function circuit and the logic circuit of other functions can simultaneously run on the programmable logic part, wherein the physical unclonable function circuit runs on the first area or the second area, and the first area and the second area
- the area of the two regions is not smaller than the area occupied by the physical unclonable function circuit, so that the first region or the second region can be configured with an infinite variety of physical unclonable function circuits of different structures, and thus realizes a variety of structures with a small overhead. Reconstruction of physically unclonable function circuits can reduce costs.
- the physical unclonable function circuit is a physical unclonable function circuit directly synthesized based on time-averaged frequency pulses.
- the structure of the physical unclonable function circuit based on the direct synthesis of time-averaged frequency pulses is shown in FIG.
- the acquired configuration file is a pre-stored configuration file
- the pre-stored configuration file is different from the configuration file of the running physical unclonable function circuit.
- the processor further includes a storage unit for storing the configuration file.
- the acquired configuration file is a regenerated configuration file
- the regenerated configuration file is different from the configuration file of the running physical unclonable functional circuit.
- control part when an external attack is detected, the control part re-acquires the configuration file, and reconstructs the physical unclonable function with different layouts on the programmable logic part according to the obtained configuration file, so as to resist external attackers through the original
- another embodiment of the present application provides a computer-readable storage medium on which a security protection program of a heterogeneous system is stored, and when the security protection program of the heterogeneous system is executed by a processor, realizes the foregoing protection of the heterogeneous system
- a security protection program for the description of the operation of the security protection program of the heterogeneous system in this application, please refer to the description of the security protection method of the heterogeneous system in this application, and details are not repeated here.
- the above computer-readable storage medium through the aforementioned security protection method for heterogeneous systems, reconstructs physical unclonable function circuits with different layouts when detecting that the heterogeneous system is attacked from outside, so that the attacker cannot attack the reconstructed physical unclonable function circuit.
- the clone function circuit is modeled, which improves the security of the system.
- another embodiment of the present application provides an electronic device, including a memory, a processor, and a security protection program for a heterogeneous system stored on the memory and running on the processor, and the processor executes the security protection of the heterogeneous system During the program, the aforementioned security protection method of the heterogeneous system is implemented, and details are not repeated here.
- the electronic device of the embodiment of the present invention through the aforementioned security protection method for heterogeneous systems, when it is detected that the heterogeneous system is attacked from outside, the physical unclonable function circuit is reconstructed with different layouts, and the attacker cannot The physical unclonable function circuit is modeled, which improves the security of the system.
- a "computer-readable medium” can be any device that can contain, store, communicate, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or apparatus.
- computer readable media include the following: electrical connections with one or more wiring (electronic devices), portable computer disk cartridges (magnetic devices), random access memory (RAM), Read Only Memory (ROM), Erasable Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM).
- the computer readable medium may even be paper or other suitable medium on which the program may be printed, as the paper or other medium may be optically scanned, for example, followed by editing, interpretation, or other suitable medium as necessary process to obtain the program electronically and then store it in computer memory.
- various parts of the present invention may be implemented in hardware, software, firmware or a combination thereof.
- various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or a combination of the following techniques known in the art: Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, Programmable Gate Arrays (PGA), Field Programmable Gate Arrays (FPGA), etc.
- first and second are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature delimited with “first”, “second” may expressly or implicitly include at least one of that feature.
- plurality means at least two, such as two, three, etc., unless otherwise expressly and specifically defined.
- the terms “installed”, “connected”, “connected”, “fixed” and other terms should be understood in a broad sense, for example, it may be a fixed connection or a detachable connection , or integrated; it can be a mechanical connection or an electrical connection; it can be directly connected or indirectly connected through an intermediate medium, it can be the internal connection of two elements or the interaction relationship between the two elements, unless otherwise specified limit.
- installed may be a fixed connection or a detachable connection , or integrated; it can be a mechanical connection or an electrical connection; it can be directly connected or indirectly connected through an intermediate medium, it can be the internal connection of two elements or the interaction relationship between the two elements, unless otherwise specified limit.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (16)
- 一种异构系统的安全防护方法,其特征在于,所述异构系统包括处理器,所述处理器包括第一区域,所述第一区域包括物理不可克隆函数电路,所述方法包括:检测所述异构系统的输入是否异常;当检测到所述异构系统的输入异常时,获取配置文件,其中,所述获取的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件;根据所述获取的配置文件在所述处理器上重新构建所述物理不可克隆函数电路的映射关系。
- 根据权利要求1所述的安全防护方法,其特征在于,根据所述获取的配置文件在所述处理器上重新构建所述物理不可克隆函数电路的映射关系,包括:根据所述获取的配置文件,对所述物理不可克隆函数电路进行编译后重新设计;将所述设计的结果存储至所述处理器,以重新构建所述物理不可克隆函数电路的映射关系。
- 根据权利要求2所述的安全防护方法,其特征在于,将所述设计的结果存储至所述处理器,以重新构建所述物理不可克隆函数电路的映射关系包括:将所述设计的结果存储至至所述处理器的所述第一区域或者不同于所述第一区域的第二区域,以重新构建所述物理不可克隆函数电路的映射关系。
- 根据权利要求1-3中任一项所述的安全防护方法,其特征在于,所述物理不可克隆函数电路为基于时间平均频率脉冲直接合成的物理不可克隆函数电路。
- 根据权利要求4所述的安全防护方法,其特征在于,所述基于时间平均频率脉冲直接合成的物理不可克隆函数电路根据以下步骤构建映射关系:通过对称的第一基于时间平均频率脉冲直接合成器和第二基于时间平均频率脉冲直接合成器分别提取第一参数,以生成对应的特征比特流;根据所述第一基于时间平均频率脉冲直接合成器和所述第二基于时间平均频率脉冲直接合成器输出特征比特流的延迟特性构建映射关系。
- 根据权利要求1所述的安全防护方法,其特征在于,当检测到所述异构系统的输入异常时,获取配置文件,包括:获取预存的配置文件,其中,获取的预存的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件;或重新生成配置文件,其中,重新生成的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件。
- 一种计算机可读存储介质,其特征在于,其上存储有异构系统的安全防护防护程序, 该异构系统的安全防护程序被处理器执行时实现如权利要求1-6中任一项所述的异构系统的安全防护方法。
- 一种电子设备,其特征在于,包括存储器、处理器及存储在存储器上并可在处理器上运行的异构系统的安全防护程序,所述处理器执行所述安全防护程序时,实现如权利要求1-6中任一项所述的异构系统的安全防护方法。
- 一种异构系统的安全防护装置,其特征在于,所述异构系统包括处理器,所述处理器包括第一区域,所述第一区域包括物理不可克隆函数电路,所述安全防护装置包括:检测模块,用于检测所述异构系统的输入是否异常;获取模块,用于在所述异构系统的输入异常时,获取配置文件,所述获取的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件;重构模块,用于根据获取的配置文件在所述处理器上重新构建所述物理不可克隆函数电路的映射关系。
- 一种处理器,其特征在于,包括:可编程逻辑部,所述可编程逻辑部包括第一区域,所述第一区域包括物理不可克隆函数电路;检测器,所述检测器用于检测所述处理器是否被攻击;操作部,所述操作部用于在所述处理器被攻击时,获取配置文件,并根据所述获取的配置文件在所述可编程逻辑部重新构建所述物理不可克隆函数电路的映射关系,其中,所述获取的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件。
- 根据权利要求10所述的处理器,其特征在于,所述操作部还用于根据所述获取的配置文件,对所述物理不可克隆函数电路进行编译后重新设计,并将所述设计的结果存储至所述可编程逻辑部,以重新构建所述物理不可克隆函数电路的映射关系。
- 根据权利要求10所述的处理器,其特征在于,所述操作部还用于将所述设计的结果存储至所述可编程逻辑部的第一区域或不同于所述第一区域的第二区域,以重新构建所述物理不可克隆函数电路的映射关系。
- 根据权利要求10-12中任一项所述的处理器,其特征在于,所述物理不可克隆函数电路为基于时间平均频率脉冲直接合成的物理不可克隆函数电路。
- 根据权利要求13所述的处理器,其特征在于,所述基于时间平均频率脉冲直接合成的物理不可克隆函数电路包括:对称的第一基于时间平均频率脉冲直接合成器和第二基于时间平均频率脉冲直接合成器,所述第一基于时间平均频率脉冲直接合成器和第二基于时间平均频率脉冲直接合成器用于分别提取第一参数,以生成对应的特征比特流;触发器,所述触发器用于根据所述第一基于时间平均频率脉冲直接合成器和所述第二基于时间平均频率脉冲直接合成器输出特征比特流的延迟特性产生特征响应。
- 根据权利要求10所述的处理器,其特征在于,所述获取的配置文件为预存的配置文件,且所述预存的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件。
- 根据权利要求10所述的处理器,其特征在于,所述获取的配置文件为重新生成的配置文件,且所述重新生成的配置文件不同于已运行的所述物理不可克隆函数电路的配置文件。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/034,051 US20230394137A1 (en) | 2020-11-20 | 2020-11-20 | Security protection method for heterogeneous system, non-volatile computer-readable storage medium, electronic device, and processor |
CN202080002890.3A CN114830598B (zh) | 2020-11-20 | 2020-11-20 | 异构系统的安全防护方法、装置及处理器 |
PCT/CN2020/130574 WO2022104731A1 (zh) | 2020-11-20 | 2020-11-20 | 异构系统的安全防护方法、装置及处理器 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/130574 WO2022104731A1 (zh) | 2020-11-20 | 2020-11-20 | 异构系统的安全防护方法、装置及处理器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022104731A1 true WO2022104731A1 (zh) | 2022-05-27 |
Family
ID=81708250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/130574 WO2022104731A1 (zh) | 2020-11-20 | 2020-11-20 | 异构系统的安全防护方法、装置及处理器 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230394137A1 (zh) |
CN (1) | CN114830598B (zh) |
WO (1) | WO2022104731A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521538A (zh) * | 2011-12-07 | 2012-06-27 | 浙江大学 | 基于多频率段的物理不可克隆函数结构 |
CN105978694A (zh) * | 2016-04-29 | 2016-09-28 | 中国科学院计算技术研究所 | 抗建模攻击的强物理不可克隆函数装置及其实现方法 |
US20170111180A1 (en) * | 2015-03-24 | 2017-04-20 | Intel Corporation | Stable probing-resilient physically unclonable function (puf) circuit |
CN111355589A (zh) * | 2020-01-16 | 2020-06-30 | 南京航空航天大学 | 一种可重构环形振荡器物理不可克隆函数电路及其激励生成方法 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198268B (zh) * | 2013-03-18 | 2016-06-08 | 宁波大学 | 一种可重构多端口物理不可克隆函数电路 |
US8981810B1 (en) * | 2013-04-22 | 2015-03-17 | Xilinx, Inc. | Method and apparatus for preventing accelerated aging of a physically unclonable function |
CN104168264B (zh) * | 2014-07-11 | 2017-12-26 | 南京航空航天大学 | 一种低成本、高安全性物理不可克隆函数电路 |
DE102014218218A1 (de) * | 2014-09-11 | 2016-03-17 | Robert Bosch Gmbh | Verfahren zum Erzeugen eines kryptographischen Schlüssels in einem System-on-a-Chip |
WO2019055769A1 (en) * | 2017-09-15 | 2019-03-21 | Harman International Industries, Incorporated | FREQUENCY BASED CAUSALITY LIMITER FOR ACTIVE NOISE CONTROL SYSTEMS |
US11082241B2 (en) * | 2018-03-30 | 2021-08-03 | Intel Corporation | Physically unclonable function with feed-forward addressing and variable latency output |
-
2020
- 2020-11-20 WO PCT/CN2020/130574 patent/WO2022104731A1/zh active Application Filing
- 2020-11-20 US US18/034,051 patent/US20230394137A1/en active Pending
- 2020-11-20 CN CN202080002890.3A patent/CN114830598B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521538A (zh) * | 2011-12-07 | 2012-06-27 | 浙江大学 | 基于多频率段的物理不可克隆函数结构 |
US20170111180A1 (en) * | 2015-03-24 | 2017-04-20 | Intel Corporation | Stable probing-resilient physically unclonable function (puf) circuit |
CN105978694A (zh) * | 2016-04-29 | 2016-09-28 | 中国科学院计算技术研究所 | 抗建模攻击的强物理不可克隆函数装置及其实现方法 |
CN111355589A (zh) * | 2020-01-16 | 2020-06-30 | 南京航空航天大学 | 一种可重构环形振荡器物理不可克隆函数电路及其激励生成方法 |
Non-Patent Citations (3)
Title |
---|
TIAN, YUAN: "The Research and Design of Frequency Synthesizer Based on Method of Time-average-frequency", CHINESE MASTER'S THESES FULL-TEXT DATABASE, 1 June 2017 (2017-06-01), pages 1 - 93, XP055932261 * |
ULRICH RÜHRMAIR; FRANK SEHNKE; JAN SÖLTER; GIDEON DROR; SRINIVAS DEVADAS; JÜRGEN SCHMIDHUBER: "Modeling attacks on physical unclonable functions", PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 4 October 2010 (2010-10-04) - 8 October 2010 (2010-10-08), pages 237 - 249, XP058270196, ISBN: 978-1-4503-0245-6, DOI: 10.1145/1866307.1866335 * |
XIANG QUN-LIANG, ZHANG PEI-YONG, OUYANG DONG-SHENG, FENG CHEN-HUI: "Multiple Frequency Slots Based Physical Unclonable Functions", JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, vol. 34, no. 8, 15 August 2012 (2012-08-15), CN , pages 2007 - 2012, XP055932266, ISSN: 1009-5896, DOI: 10.3724/SP.J.1146.2011.01249 * |
Also Published As
Publication number | Publication date |
---|---|
CN114830598A (zh) | 2022-07-29 |
US20230394137A1 (en) | 2023-12-07 |
CN114830598B (zh) | 2024-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11860782B2 (en) | Compensating for DRAM activation penalties | |
US7475370B2 (en) | System for verification using reachability overapproximation | |
EP3596671A1 (en) | Quantifying consistency of a system architecture | |
JP7004712B2 (ja) | プログラム可能クロックモニタ | |
US7930672B2 (en) | Incremental design reduction via iterative overapproximation and re-encoding strategies | |
JP2004511834A5 (zh) | ||
AU2018235926B2 (en) | Property graph data model representing system architecture | |
US8199910B2 (en) | Signature generation apparatus and signature verification apparatus | |
US10459929B2 (en) | Quantifying robustness of a system architecture by analyzing a property graph data model representing the system architecture | |
US10430463B2 (en) | Systems and methods for generating a weighted property graph data model representing a system architecture | |
KR20220097249A (ko) | 시스템의 컴포넌트 불량을 감지할 수 있는 시스템 및 그 방법 | |
Sadredini et al. | Sunder: Enabling low-overhead and scalable near-data pattern matching acceleration | |
WO2022104731A1 (zh) | 异构系统的安全防护方法、装置及处理器 | |
JP6992343B2 (ja) | 情報処理装置、情報処理方法、および情報処理プログラム | |
Sun et al. | Mining association rules with systolic trees | |
Gupta et al. | BTI-aware design using variable latency units | |
US20200004503A1 (en) | Information processing device, information processing method, and computer readable medium | |
JP6918267B2 (ja) | ボトルネック検出装置及びボトルネック検出プログラム | |
US20230098098A1 (en) | Scalable scribe regions for implementing user circuit designs in an integrated circuit using dynamic function exchange | |
Yoneda et al. | Verification of bounded delay asynchronous circuits with timed traces | |
Zheng et al. | Automatic Abstraction for Verification of Timed Circuits and Systems? | |
Chen et al. | HierCGRA: A Novel Framework for Large-scale CGRA with Hierarchical Modeling and Automated Design Space Exploration | |
JPWO2018163387A1 (ja) | 解析装置、解析方法及び解析プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20962022 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20962022 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11/01/2024) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20962022 Country of ref document: EP Kind code of ref document: A1 |