AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs.

DAC(2016)

引用 118|浏览82
暂无评分
摘要
A finite state machine (FSM) is responsible for controlling the overall functionality of most digital systems and, therefore, the security of the whole system can be compromised if there are vulnerabilities in the FSM. These vulnerabilities can be created by improper designs or by the synthesis tool which introduces additional don't-care states and transitions during the optimization and synthesis process. An attacker can utilize these vulnerabilities to perform fault injection attacks or insert malicious hardware modifications (Trojan) to gain unauthorized access to some specific states. To our knowledge, no systematic approaches have been proposed to analyze these vulnerabilities in FSM. In this paper, we develop a framework named Analyzing Vulnerabilities in FSM (AVFSM) which extracts the state transition graph (including the don't-care states and transitions) from a gate-level netlist using a novel Automatic Test Pattern Generation (ATPG) based approach and quantifies the vulnerabilities of the design to fault injection and hardware Trojan insertion. We demonstrate the applicability of the AVFSM framework by analyzing the vulnerabilities in the FSM of AES and RSA encryption module. We also propose a low-cost mitigation technique to make FSM more secure against these attacks.
更多
查看译文
关键词
vulnerability identification,vulnerability mitigation,finite state machine,digital systems,system security,don't-care states,optimization process,synthesis process,improper designs,synthesis tool,fault injection attacks,malicious hardware modifications,unauthorized access,analyzing vulnerabilities in FSM,state transition graph,gate-level netlist,automatic test pattern generation,ATPG-based approach,design vulnerabilities,fault injection,hardware Trojan insertion,AVFSM framework,AES encryption module,RSA encryption module,low-cost mitigation technique
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要