期刊文献+

针对RAM防护的二维多比特报警法

A Novel Two Dimensional Multi-Bits Alarm Method for RAM Protection
在线阅读 下载PDF
导出
摘要 针对安全芯片中RAM故障对系统安全性的危害,提出了一种基于二维纠错码的RAM防护技术,即二维多比特纠正报警法(TDMBAM)。该技术设计了一种可以有效识别、纠正RAM故障类型的二维纠错码,并可对二维纠错码的纠错能力和RAM的故障类型进行评估。TDMBAM对RAM进行了分区防护,将RAM分为程序存储区和数据存储区,并根据存储区的各自特点设计相异的纠错报警电路。对TDMBAM进行算法仿真,结果表明TDMBAM纠正了给定宽度内所有的连续和非连续故障,并对超过识别能力的故障给出了报警。报警后的系统有99.147 7%没有产生系统故障,并按照系统预定状态工作。 The two-dimensional multi-bits alarm method(TDMBAM) is proposed to reduce the damage of system security caused by RAM faults. The proposed method is based on two-dimensional error correction code.TDMBAM is able to correct multiple bit faults of RAM with any possible width and evaluate the error correcting capacity of two-dimensional code and RAM faults type. TDMBAM is designed to have partitioned protection for RAM with program memory block and data memory block, and has two different error correcting alarm circuits according to the respective characteristics of two memory blocks. TDMBAM is simulated and the results show that it is able to correct all continuous and discontinuous faults within the given width, and able to alarm faults beyond identification. Up to 99.147 7% alarmed systems are able to work in schedule without system faults.
作者 孙瑞一 张钦宇 梁松海 梁允萍 SUN Rui-yi;ZHANG Qin-yu;LIANG Song-hai;LIANG Yun-ping(School of Electronic and Information Engineering,Harbin Institute of Technology(Shenzhen)Shenzhen Guangdong 518055;Nationz Technologies Co.,Ltd.Shenzhen Guangdong 518057)
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2019年第2期264-271,共8页 Journal of University of Electronic Science and Technology of China
关键词 容错 存储器 安全芯片 二维纠错码 fault tolerant memory security chip two dimensional error correction code
  • 相关文献

参考文献2

二级参考文献10

  • 1Agrawal D, Rao Josyula, Rohatgi P. Multi-channel Attacks[C]//Proc. of Conf. on Cryptographic Hardware and Embedded Systems. [S.l.]: Springer-Verlag, 2003.
  • 2Smith S W. Trusted Computing Platforms: Design and Applications[M]. [S. l.]: Springer Norwell, 2005:21-25.
  • 3Altera Corporation. Cyclone Device Handbook[Z]. [2008-10-08]. http://www.altera.com.
  • 4Kocher E Timing Attack on Implementation of Diffe-Hellman, RSA DSS and Other Systems[C]//Proc. of CRYPTO'96. New York, USA: Springer-Verlag, 1996.
  • 5Kocher P C, Jaffe J, Jun Benjamin. Differential Power Analysis[C]//Proc. of the 19th Annual International Cryptology Conference. Santa Barbara, California, USA: Is. n.], 1999.
  • 6Skorobogatov S, Semi-invasive Attacks A New Approach to Hardware Security Analysis[D]. London, UK: University of Cambridge, 2005.
  • 7Makwana J J, Schroder D K. A Nonvolatile Memory Overview[EB/OL]. (2010-11-11). http://aplarence.com/Makwana/ nonvolmem.html.
  • 8Skorobogatov S. Local Heating Attacks on Flash Memory Devices[C]//Proc. of IEEE International Workshop on Hardware Oriented Security and Trust. San Francisco, USA: Moscone Center, 2009.
  • 9邓高明,赵强,张鹏,陈开颜.基于AES算法的Cache Hit旁路攻击[J].计算机工程,2008,34(13):113-114. 被引量:8
  • 10陈财森,王韬,郑媛媛,赵新杰.RSA公钥密码算法的计时攻击与防御[J].计算机工程,2009,35(2):123-125. 被引量:9

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部