DC 欄位 |
值 |
語言 |
DC.contributor | 資訊工程學系 | zh_TW |
DC.creator | 林祐丞 | zh_TW |
DC.creator | You-Cheng Lin | en_US |
dc.date.accessioned | 2023-8-9T07:39:07Z | |
dc.date.available | 2023-8-9T07:39:07Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://ir.lib.ncu.edu.tw:444/thesis/view_etd.asp?URN=110522016 | |
dc.contributor.department | 資訊工程學系 | zh_TW |
DC.description | 國立中央大學 | zh_TW |
DC.description | National Central University | en_US |
dc.description.abstract | 現今很多嵌入式系統開發商將現場可程式化邏輯閘陣列 (FPGA) 的設計外包給知識產權 (IP) 設計公司。為了保護他們的 IP 設計 (FPGA的配置) 免受篡改,需要一種安全的認證方法。在本文中,我們提出了一種針對 Xilinx Ultrascale+ MPSoC 架構的 FPGA 的安全認證方法。而在認證之前需要一個讀回 FPGA 的配置。然而,Xilinx Ultrascale+ MPSoC 讀回方法很容易受到攻擊。而傳統的 FPGA 認證方法在 FPGA 內部實現認證模組,消耗了大量的 FPGA 資源。在我們的方法中,我們禁用了 Xilinx Ultrascale+ MPSoC 中的讀回流程。攻擊者無法訪問 FPGA 的配置。我們利用可信執行環境 (TEE) 安全地讀回 FPGA 的配置,而不需要消耗 FPGA 的資源。我們的證明模組可以安全地認證 FPGA 的執行狀態。分析和實驗表明,我們的設計可以安全地讀回 FPGA 的配置並對其進行認證。 | zh_TW |
dc.description.abstract | Nowadays, many embedded system developers outsource the designs of Field Programmable Gate Array (FPGA) to Intellectual Property (IP) design houses. To protect their IP designs (the configuration of FPGA) from tamper attack, a secure attestation method is necessary. In this paper, we propose a secure attestation method for FPGA in Xilinx Ultrascale+ MPSoC architecture. To attest the configuration of FPGA, a readback process is needed before attestation. However, Xilinx Ultrascale+ MPSoC readback method is vulnerable. Traditional attestation methods for FPGA implement their attestation module in FPGA, which consumes lots of resources of FPGA. In our method, we disable the readback flow in Xilinx Ultrascale+ MPSoC. The adversaries cannot access the configuration of FPGA. We leverage Trusted Execution Environment (TEE) to readback the configuration status of FPGA securely, which does not need to consume the resources of FPGA. Our attestation module can securely attest to the execution status of FPGA. Analysis and experimental results show that our design can readback the configuration of FPGA securely and attest it efficiently. | en_US |
DC.subject | FPGA 讀回 | zh_TW |
DC.subject | 故障回復 | zh_TW |
DC.subject | IP 竊盜 | zh_TW |
DC.subject | 可信執行環境 | zh_TW |
DC.subject | ARM TrustZone | zh_TW |
DC.subject | FPGA Readback | en_US |
DC.subject | Failure Recovery | en_US |
DC.subject | IP theft | en_US |
DC.subject | Trusted Execution Environment | en_US |
DC.subject | ARM TrustZone | en_US |
DC.title | TrustFADE: 針對可程式化邏輯區塊之安全認證方法 | zh_TW |
dc.language.iso | zh-TW | zh-TW |
DC.title | TrustFADE: An Anti-theft Attestation Design for Programmable Logic | en_US |
DC.type | 博碩士論文 | zh_TW |
DC.type | thesis | en_US |
DC.publisher | National Central University | en_US |