李翔宇. 基于去协同的抗硬件木马交换机解析器[J]. 微电子学与计算机, 2021, 38(4): 1-5.
引用本文: 李翔宇. 基于去协同的抗硬件木马交换机解析器[J]. 微电子学与计算机, 2021, 38(4): 1-5.
LI Xiang-yu. Hardware trojans resilient switch parser based on destruction of cooperation[J]. Microelectronics & Computer, 2021, 38(4): 1-5.
Citation: LI Xiang-yu. Hardware trojans resilient switch parser based on destruction of cooperation[J]. Microelectronics & Computer, 2021, 38(4): 1-5.

基于去协同的抗硬件木马交换机解析器

Hardware trojans resilient switch parser based on destruction of cooperation

  • 摘要: 设计了一种既支持软件定义网络又能在有硬件木马的情况下正常工作的交换机包解析器.使用以查找表为核心的可重构基本处理单元构成包解析器,同时将输入数据与随机密钥进行异或(去协同变码)后再送入包解析器以破坏包头中潜藏的木马触发指令.采用模板同步变码的方式进行关键字匹配,从而避免原文在模块内部出现.基于该结构实现的L4以太网交换机包解析器,使用40 nm工艺库综合的时钟频率可以达到220 MHz,基本处理单元的面积约为176万门.测试结果表明,该包解析器可以破坏不同类型的木马触发指令.

     

    Abstract: A switch parser that can not only support software-defined network but also work even with hardware Trojans has been designed. It is composed of reconfigurable process elements of which kernels are lookup tables. The input data are XORed with a random key (Destruction of Cooperation transformation) before being fetched into the parser to destruct the possible argots in the head of packets. The key word match is completed in the approach of transforming the pattern templates at the same time, which avoids appearance of the original data. Synthesized with a 40nm process, the L4 switch parser implemented in this structure achieves up to 220 MHz clock frequency, the area of the PE is about 1760, 000 gates. The test results show that the parser can destruct different types of Trojan trigger conditions.

     

/

返回文章
返回