DocumentCode :
2718751
Title :
Automatic saboteur placement for emulation-based multi-bit fault injection
Author :
Grinschgl, Johannes ; Krieg, Armin ; Steger, Christian ; Weiss, Reinhold ; Bock, Holger ; Haid, Josef
Author_Institution :
Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria
fYear :
2011
fDate :
20-22 June 2011
Firstpage :
1
Lastpage :
8
Abstract :
During recent years the dependability and security requirements of system-on-chip (SoC) designs have increased tremendously. Both, dependability and security, domains are concerned with operational faults of a random or intentional nature. In former case random faults e.g. caused by radiation or degradation effects could lead to execution errors with possible dramatic results. The security domain is more concerned with intentional faults injected by an adversary during a physical attack to drive the system into an unintended state. The resistance of such a design against faults can be emulated during early design phases using fault injection methods. For these methods the design-under-test is augmented with additional circuitry to emulate faults at predestined locations. One method uses saboteurs, elements that are transparent during normal operation and faulty if activated, are placed into the target system. If this placement process includes a high number of saboteurs, the hardware description manipulation could be a challenge for the design engineer. Therefore this paper presents an automatic placement methodology for fault injection evaluations using saboteur techniques. The automatized process allows for the efficient placement of large amounts of saboteurs. This enables the designer to evaluate a high number of different dependability and fault attack scenarios during early design phases using FPGA-based functional emulation. Selected case studies show how this approach can be applied to a common general purpose architecture in an efficient way.
Keywords :
fault tolerant computing; field programmable gate arrays; logic design; security of data; system-on-chip; FPGA-based functional emulation; dependability requirement; design-under-test; emulation-based multibit fault injection; fault injection method; field programmable gate array; saboteur placement; security domain; security requirement; system-on-chip design; Adaptation models; Circuit faults; Emulation; Hardware; Security; System-on-a-chip; XML;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), 2011 6th International Workshop on
Conference_Location :
Montpellier
Print_ISBN :
978-1-4577-0640-0
Type :
conf
DOI :
10.1109/ReCoSoC.2011.5981521
Filename :
5981521
Link To Document :
بازگشت