中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/92767
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78852/78852 (100%)
Visitors : 37825527      Online Users : 2487
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/92767


    Title: TrustFADE: 針對可程式化邏輯區塊之安全認證方法;TrustFADE: An Anti-theft Attestation Design for Programmable Logic
    Authors: 林祐丞;Lin, You-Cheng
    Contributors: 資訊工程學系
    Keywords: FPGA 讀回;故障回復;IP 竊盜;可信執行環境;ARM TrustZone;FPGA Readback;Failure Recovery;IP theft;Trusted Execution Environment;ARM TrustZone
    Date: 2023-08-09
    Issue Date: 2023-10-04 16:10:17 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 現今很多嵌入式系統開發商將現場可程式化邏輯閘陣列 (FPGA) 的設計外包給知識產權 (IP) 設計公司。為了保護他們的 IP 設計 (FPGA的配置) 免受篡改,需要一種安全的認證方法。在本文中,我們提出了一種針對 Xilinx Ultrascale+ MPSoC 架構的 FPGA 的安全認證方法。而在認證之前需要一個讀回 FPGA 的配置。然而,Xilinx Ultrascale+ MPSoC 讀回方法很容易受到攻擊。而傳統的 FPGA 認證方法在 FPGA 內部實現認證模組,消耗了大量的 FPGA 資源。在我們的方法中,我們禁用了 Xilinx Ultrascale+ MPSoC 中的讀回流程。攻擊者無法訪問 FPGA 的配置。我們利用可信執行環境 (TEE) 安全地讀回 FPGA 的配置,而不需要消耗 FPGA 的資源。我們的證明模組可以安全地認證 FPGA 的執行狀態。分析和實驗表明,我們的設計可以安全地讀回 FPGA 的配置並對其進行認證。;Nowadays, many embedded system developers outsource the designs of Field Programmable Gate Array (FPGA) to Intellectual Property (IP) design houses. To protect their IP designs (the configuration of FPGA) from tamper attack, a secure attestation method is necessary. In this paper, we propose a secure attestation method for FPGA in Xilinx Ultrascale+ MPSoC archi tecture. To attest the configuration of FPGA, a readback process is needed before attestation. However, Xilinx Ultrascale+ MPSoC readback method is vulnerable. Traditional attestation methods for FPGA implement their at testation module in FPGA, which consumes lots of resources of FPGA. In our method, we disable the readback flow in Xilinx Ultrascale+ MPSoC. The adversaries cannot access the configuration of FPGA. We leverage Trusted Execution Environment (TEE) to readback the configuration status of FPGA securely, which does not need to consume the resources of FPGA. Our attes tation module can securely attest to the execution status of FPGA. Analysis and experimental results show that our design can readback the configuration of FPGA securely and attest it efficiently.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML42View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明