《机电工程》杂志,月刊( 详细... )

中国标准连续出版物号 ISSN 1001-4551 CN 33-1088/TH
主办单位浙江省机电集团有限公司
浙江大学
主编赵 群
副 主 编唐任仲、罗向阳(执行主编)
总 经 理罗向阳
出 版浙江《机电工程》杂志社有限公司
地 址杭州市上城区延安路95号浙江省机电集团大楼二楼211、212室
电话Tel+86-571-87041360、87239525
E-mailmeem_contribute@163.com
国外发行中国国际图书贸易总公司
订阅全国各地邮局   国外代号M3135
国内发行浙江省报刊发行局
邮发代号32-68
广告发布登记证:杭上市管广发G-001号

在线杂志

当前位置: 机电工程 >>在线杂志

一种嵌入式系统软件水印识别器的VLSI实现

作者:罗 江,沈海斌 日期:2007-08-31/span> 浏览:3225 查看PDF文档

                                                        一种嵌入式系统软件水印识别器的VLSI实现*
                                                                             罗 江,沈海斌
                                        (浙江大学 超大规模集成电路设计研究所,浙江 杭州 310027)

摘 要:提出了一种基于分支软件水印方案识别器的VLSI实现。硬件形式的识别器一般难以获取嵌入式系统内部的函数返回地址,通过改进获取指纹信息分支函数(FBF)入口的方法,使得只需要根据系统的程序指针和指令字就可以完成FBF函数入口的识别,使原有方法更适用于嵌入式系统。最后针对所支持的指令集进行了仿真测试,并对设计实现进行了逻辑综合。性能分析表明,硬件形式识别器识别速度远远超过软件的识别速度。
关键词:嵌入式系统;软件水印;无条件分支;超大规模集成电路


                    VLSI implementation of recognizer for software watermarking in embedded system
                                                             LUO Jiang, SHEN haibin
                              (Institute of VLSI Design, Zhejiang University, Hangzhou 310027, China)

Abstract: A VLSI implementation of recognizer for a branchbased software watermarking scheme was introduced. It is usually hard for hardware recognizers to get inner return address of the embedded system, by improving the method of accessing the entry of fingerprinting branch function (FBF), only program counter and instruction word is necessary to the recognition of FBF entry, making the method more suitable for embedded systems. Finally, a simulation had been launched in accordance with supported instruction set, and the whole design was logic compiled. According to performance analysis, hardware recognizers run at far more speed than software does.
Key words: embedded system; software watermarking; unconditional branch; vory large scale integration (VLSI)

参考文献(Reference):
[1]NAGRA J, THOMBORSON C, COLLBERG C. A Functional Taxonomy for Software Watermarking[C].Proceedings of ACSC 2002.Melbourne: Michael Oudshoorn, 2002:177-186.
[2]COLLBERG C, THOMBORSON C. Software Watermarking: Models and Dynamic Embeddings[C].Proceedings of 26th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages. San Antonio: [s.n.], 1999:311-324.
[3]PALSBERG J, KRISHNASWAMY S, KWON M, et al. Experience with Software Watermarking[C].Proceedings of 16th Annual Computer Security Applications Conference. USA: [s.n.], 2001:308-316.
[4]COLLBERG C, CARTER E, DEBRAY S, et al. Dynamic Pathbased Software Watermarking[C]. Proceedings of PLDI04. Washington DC: [s.n.], 2004:107-118.
[5]MYLES G, JIN Hongxia. Selfvalidating Branchbased Software Watermarking[C].Proceedings of LNCS 2005. USA: [s.n.], 2005:342-356.
[6]GUPTA Gu,PIEPRZYK J. A Lowcost Attack on Branchbased Software Watermarking[C]. Proceedings of LNCS 2006. USA: [s.n.], 2006:282-293.
[7]YIAKOUMIS I, PAPADONIKOLAKIS M, MICHAIL H. Efficient Smallsized Implementation of the Keyedhash Message Authentication Code[C]. Proceedings of EUROCON 2005. Serbia & Montenegro: [s.n.], 2005:1875-1878.



友情链接

浙江机械信息网