• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 30 Issue 2
Apr.  2017
Turn off MathJax
Article Contents
PENG Kaibei, JIA Ruiqing. Security of Finite State Machines in Sequential Circuits[J]. Journal of Southwest Jiaotong University, 2017, 30(2): 424-428. doi: 10.3969/j.issn.0258-2724.2017.02.028
Citation: PENG Kaibei, JIA Ruiqing. Security of Finite State Machines in Sequential Circuits[J]. Journal of Southwest Jiaotong University, 2017, 30(2): 424-428. doi: 10.3969/j.issn.0258-2724.2017.02.028

Security of Finite State Machines in Sequential Circuits

doi: 10.3969/j.issn.0258-2724.2017.02.028
  • Received Date: 25 Jan 2015
  • Publish Date: 25 Apr 2017
  • In view of the potential security problems brought by the don't care state in the optimization of finite state machine (FSM), the definition of safe state and its design method are presented after analysis of the factors leading to intrusion into FSM and the attack paths. Without affecting the flip-flop function, state protection of FSM is realized by adding a feedback signal to the T-type flip-flop. Results show that the experimental circuit with state feedback signal is 144.7% higher than the original experimental circuit in the power consumption, delay and area; the experimental circuit optimized with T-type flip-flop is 3.6% lower than the original experimental circuit in power consumption, 18.9% lower in area, and 19.6% higher in delay.

     

  • loading
  • GU Juan, QU Gang, ZHOU Qiang. Information hiding for trusted system design[C]//46th ACM/IEEE Design Automation Conference. New York: IEEE, 2009: 698-701.
    SALLY A. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39.
    EC O. On integrated circuits supply chain issues in a global commercial market[C]//Defense Security and Access Concerns.March, New York: [s.n.], 2007: 578-581.
    刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679. LIU Li, WANG Yongqing. Security analysis of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679.
    TRIMBERGER S. Trusted design in FPGAs[C]//44th ACM/IEEE Design Automation Conference. California: [s.n.], 2007: 5-8.
    CHRISTOPHER U. Complexity of two-level logic minimization[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(7): 1230-1246.
    WEI Sheng, LI Kai, FARINAZ K, et al. Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry[C]//49th ACM/IEEE Design Automation Conference. New York: IEEE, 2012: 90-95.
    YUAN Lin, QU Gang, VILLA T, et al. An FSM re-engineering: a novel approach to sequential circuit synthesis [J]. Journal IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Archive, 2008, 27(6): 1159-1164.
    WEI Sheng, LI Kai, KOUSHANFAR F. Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry[C]//ACM/IEEE Design Automation Conference. New York: IEEE, 2012: 90-95.
    范明俊,李宁,赵乐军,等. 一种安全可靠性高的全新IP核保护方法[J]. 微电机学,2007,37(2): 185-188. FAN Mingjun, LI Ning, ZHAO Lejun, et al. A new ip protection method with high safety[J]. Microelectronics, 2007, 37(2): 185-188.
    ZHANG Jie, YUAN Feng, WEI Lingxiao, et al. Veritrust: verification for hardware trust[C]//DAC '13 Proceedings of the 50th Annual Design Automation Conference. New York: [s.n.], 2013: 670-675.
    施惠丰,袁道华. 基于多核的多线程程序优化研究[J]. 计算机技术与发展,2010,20(6): 70-73. SHI Huifeng, YUAN Daohua. Research on optimizing multi-thread programming based on multi-core processor[J]. Computer Technology and Development, 2010, 20(6): 70-73.
    杨庆. 有限状态机的设计与优化[J]. 湖北民族学院学报:自然科学版,2006,24(1): 55-57. YANG Qing. Design and optimization of finite state machine[J]. Journal of Hubei Institute for Nationalities: Natural Science Edition, 2006, 24(1): 55-57.
    颜玉兰,何克清,刘进. 一种基于有限状态机的模型转换方法[J]. 计算机工程,2006,32(1): 93-95,200. YAN Yulan, HE Keqing, LIU Jin. A method of model transformation based on finite state machine[J]. Computer Engineering, 2006, 32(1): 93-95, 200.
    孔昕,吴武臣,侯立刚,等. 基于Verilog 的有限状态机设计与优化[J]. 微电子学与计算机,2010,27(2): 180-183. KONG Xin, WU Wuchen, HOU Ligang, et al. Verilog design and optimization of fsms[J]. Microelectronics Computer, 2010, 27(2): 180-183
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(466) PDF downloads(131) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return