透過您的圖書館登入
IP:3.145.15.1
  • 學位論文

基於現場可程式化邏輯閘陣列實現可重構指令集架構 之軟硬體整合

Software and Hardware Integration for Reconfigurable Instruction Set Architecture based on FPGA

指導教授 : 郭斯彥
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著資訊科技的快速發展,大家開始注重資訊安全的問題。單純使用傳統的軟體加密技術或是硬體加密技術越來越難保證資訊安全的可靠性,尤其是現在逆向工程的技術越來越發達,很多可執行檔的 binary code 可以很輕易透過反組譯工具逆向反組譯回組合語言甚至高階語言導致一些敏感機密資料外洩。在此背景下,本論文實現了一種針對 CPU 指令集架構進行軟體與硬體整合的雙向亂序加密框架。內容包括 MIPS ISA 和 CPU0 ISA 以及其對應的高階語言 Compiler tool chain的框架設計,利用 Quartus II 17.1 做 comprehensive wiring 以及利用 Modelsim 模擬驗證,最後燒錄到 FPGA(Altera DE2­115) 上,實驗結果顯示使用我們提出的框架生成出的 CPU 以及 compiler tool chain 可以正確無誤的執行並且只有微乎其微的overhead。

並列摘要


With the rapid development of information technology, everyone has begun to pay attention to the issue of information security. It is becoming more and more difficult to ensure the reliability of information security by simply using traditional software encryption technology or hardware encryption technology, especially now that the technology of reverse engineering is more and more developed, and the binary code of many executable files can be easily decompiled through reverse translation. The tool reverses and decompiles back to the combined language and even the high­level language, which leads to the leakage of some sensitive and confidential information. Under this background, this paper implements a bidirectional out­of­order encryption framework that integrates software and hardware for CPU instruction set architecture. The content includes the framework design of MIPS ISA and CPU0 ISA and their corresponding high­level language Compiler tool chain, using Quartus II 17.1 for comprehensive wiring and M delsim simulation verification, and finally burning to FPGA (Altera DE2­115), the experimental results show that using The CPU and compiler tool chain generated by our proposed framework can be executed correctly and with only minimal overhead.

並列關鍵字

CPU ISA FPGA LLVM compiler assembly language

參考文獻


K. Gallagher, C. Caner, and J. Deignan, “The law and reverse engineering,” in 2012 19th Working Conference on Reverse Engineering, 2012, pp. 3–4
W. Choi, S. Lee, K. Joo, H. J. Jo, and D. H. Lee, “An enhanced method for reverse engineering can data payload,” IEEE Transactions on Vehicular Technology, vol. 70, no. 4, pp. 3371–33
M. Fyrbiak, S. Wallat, P. Swierczynski, M. Hoffmann, S. Hoppach, M. Wilhelm, T. Weidlich, R. Tessier, and C. Paar, “Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion,” IEEE Transactions on Dependable and Secure Computing, vol. 16,
G. Fleck, W. Kirchmayr, M. Moser, L. Nocke, J. Pichler, R. Tober, and M. Wit latschil, “Experience report on building astm based tools for multilanguage reverse engineering,” in 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vo
A. M. Villegas, “Function identification and recovery signature tool,” in 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), 2016, pp. 1–3

延伸閱讀