- 3
- 0
- 约10.17万字
- 约 14页
- 2017-08-08 发布于重庆
- 举报
attackdvi-AppearsinProceedingsofthe2011:attackdvi出现在诉讼中的2011.pdf
Appears in Proceedings of the 2011 IEEE Symposium on Security Privacy
Defeating UCI: Building Stealthy and Malicious Hardware
Cynthia Sturton Matthew Hicks David Wagner Samuel T. King
University of California, University of Illinois, University of California, University of Illinois,
Berkeley Urbana-Champaign Berkeley Urbana-Champaign
Abstract—In previous work Hicks et al. proposed a method
called Unused Circuit Identification (UCI) for detecting ma-
licious backdoors hidden in circuits at design time. The UCI
algorithm essentially looks for portions of the circuit that go
unused during design-time testing and flags them as potentially
malicious. In this paper we construct circuits that have ma-
licious behavior, but that would evade detection by the UCI
algorithm and still pass design-time test cases. To enable our
search for such circuits, we define one class of malicious circuits
and perform a bounded exhaustive enumeration of all circuits
in that class. Our approach is simple and straight forward,
yet it proves to be effective at finding circuits that can thwart
UCI. We use the results of our search to construct a practical
attack on an open-source processor. Our malicious backdoor Figure 1. The UCI Algorithm. Suppose s carries the same value as t
allows any user-level program running on the processor to enter for every test case executed during design-time testing. This means that
the intervening logic could have been replaced by a single wire, without
supervisor mode
您可能关注的文档
- AmericanDiabetesAssociation2014SCHOLARS:美国糖尿病协会的2014位学者.pdf
- AMESim软件的特征及其应用36269.pdf
- AMETEKASC300手持式多功能校准仪使用手册.pdf
- AModelofStrokeSegmentation-ZhengZhang,ChewLimTan:一种笔划分割郑张模型,咀嚼林滩.pdf
- AModifiedCrossPower-SpectrumPhaseMethodBasedon:一种改进的互功率谱相位法的基础上.pdf
- AmutationintheTMPRSS6gene,encodinga…:在TMPRSS6基因的突变,编码….pdf
- AMutationofPCDH15:里面的突变.pdf
- AN48CS电力线扩频通信芯片组及其应用_张士文.pdf
- AN501PulseWidthModulationUsingMAXIICPLDs-利用:an501脉冲宽度调制使用MAXIICPLD-利用.pdf
- AnalysisofReasonsforExtractionofEndodonticallyTreated:对提取的根管治疗的原因分析.pdf
- Attacksand-StevensInstituteofTechnology:攻击和史蒂文斯理工学院.ppt
- Attention-DeficitHyperactivityDisorderTheDiagnostic:注意缺陷多动障碍的诊断.pdf
- AttentionDeficitHyperactivityDisorder-YoungLivingOils:注意缺陷多动障碍的年轻生活油.pdf
- attentiondeficitwithhyperactivitydisorder:注意缺陷多动障碍.ppt
- AuditoryMemory-BoysTownNationalResearchHospital:听觉记忆-男孩镇全国研究院.pdf
- Aurora1030WTOC分析仪在线监测高纯水中的总有机碳.pdf
- authorizedstoragemechanism1INFO:授权存储机制1info.pdf
- AutoCAD和Surfer在煤矿等值线图绘制中的应用.pdf
- AutoCAD在房产测量中的实际应用.pdf
- AUTOCAD软件在施工测量中的应用.pdf
最近下载
- ^DLINK交换机还原用户名密码.doc VIP
- 8年级上册生物期末测试卷.doc VIP
- 投融资部2025年工作总结及2025年工作计划.docx VIP
- 内江市2022-2023学年七年级上学期期末地理试题.docx VIP
- 补骨脂主要成分的肝毒性比较研究.docx VIP
- 2024年全国职业院校技能大赛中职组(法律实务赛项)考试题库-下(多选、判断题汇总).docx
- 江苏省无锡市惠山区2024-2025学年九上化学期末质量检测模拟试题含解析.doc VIP
- 2026年春统编版(新教材)小学道德与法治三年级下册(全册)教学设计(附教材目录P97).pdf
- 2012年全国高考(江苏卷)物理试题及解答.pdf VIP
- 加州驾照笔试模拟题中文版300题目加答案版.docx
原创力文档

文档评论(0)