• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm

    2018-06-15 04:41:26YingjianYanandXinChuanDepartmentofMicroelectronicsInstituteofInformationScienceandTechnologyZhengzhou450001China

    Yingjian Yan and Xin Chuan(Department of Microelectronics, Institute of Information Science and Technology, Zhengzhou 450001, China)

    The globalization and development of the integrated circuit industry has made integrated circuits vulnerable to attacks and modifications from hardware Trojan[1]. Hardware Trojans are triggered, when needed, to steal sensitive information, destroy the circuit, and can cause harm politically, militarily, and economically[2-3]. Therefore, hardware Trojan detection has become a research hotspot in the field of integrated circuit security in recent years. Hardware Trojan detection methods for most studies are compared in Tab.1.

    For the self-designed integrated circuits, the method based on the logic testing has better practicability and higher testing efficiency in numerous hardware Trojan detection methods. This is worth further research[4-6]. The goal of hardware Trojan detection method, based on logic testing, is to generate test vector sets that effectively activate the hardware Trojan. Kitsos et al. proposed a hardware Trojan detection method using combinatorial testing[7]. Pei et al. proposed a hardware Trojan detection method based on fast triggering[8]. Voyiatzis et al. proposed a method of effectively triggering hardware Trojan horse[9].

    Tab.1 Comparison of the most studied hardware Trojan detection methods

    This paper proposes a new hardware Trojan activation method to detect the hardware Trojan in the circuit. The proposed method , based on greedy algorithm, generates test vector sets of different combination correlation coefficients to detect hardware Trojans. The experimental results shows that the proposed method can effectively activate the combinatorial hardware Trojans, improve the activation probability of the hardware Trojan, and verify the effectiveness and practicability of the method.

    1 Research on Hardware Trojan Detection

    1.1 Hardware Trojan detection model

    The combinational hardware Trojan is a type of hardware trojan with advantages of smaller area and better controllability. Attackers often insert such hardware Trojan into the cipher chip circuits to destroy the normal work of the circuit and make the circuit leak information, such as advanced encryption standard (AES), SMS4 and other encryption algorithm circuit. The detection method based on logic testing has low cost and is not affected by the detection environment. It is a practical and effective method for detecting the combinational hardware Trojan in the self-designed circuits[4,10].

    It is difficult for attackers to control the nodes inside the circuit directly. Therefore, the attacker may combine some bits of the circuit into the hardware Trojan horse trigger to achieve controllable attack. Fig.1 depicts an example of a combinational hardware Trojan. The original circuit is a six-input (Ii,i=1,2,3,4,5,6) and function circuit module. The module is inserted into a combinatorial hardware Trojan which consists of one AND gate and one XOR gate. The AND gate is the trigger, the length of activation vector is 2 and the XOR gate is the payload. When input bitsI3I6are set to “01”, the hardware Trojan is activated, the output value is tampered by non-value of the correct output.

    Fig.1 Example of combinatorial hardware Trojan

    During hardware Trojan detection of this module, the output value is observed by applying a test set to the input value. If the output value is different from the standard output value upon comparing the two values, then there is a hardware Trojan in the module. Otherwise, the hardware Trojan does not exist[5]. Therefore, the hardware Trojan detection based on logic testing focuses on generating a test vector set that can activate the hardware Trojan given that the test vector set is of small scale and high efficiency.

    1.2 Overview of the greedy algorithm

    Greedy algorithm is one of the heuristic algorithms for solving non-deterministic, polynomial, complete, problem (NPC) problems and seeking a better solution[11]. The basic idea of the greedy algorithm is to formulate a greedy strategy based on an initial solution of the problem and gradually approximate the solution target. In the greedy algorithm, the greedy strategy is related to the optimization ability of the algorithm and the quality of the final solution. For each step in the process of solving the problem, the choice of solution is based on the greedy strategy, and the optimal solution is always chosen as the solution of this step. This solution is called the local optimal solution. Choosing the appropriate greedy strategy can obtain better approximation solution and can reduce the complexity of the algorithm.

    In hardware Trojan detection based on logic testing, the goal is to generate a test vector setwith small scale and high efficiency. Because this is an optimization problem, the greedy algorithm can be used to find the optimal solution that will generate the test vector set. In this paper, greedy algorithm is used to formulate greedy strategy and generate a test vector set which is used to detect combinational hardware Trojans.

    1.3 Research on test vector generation algorithm

    If the input of a circuit hasnbits that can be used by the attacker, there will be 2npossible activation vectors[12]. When attackers design hardware Trojans, they need to consider the area, power consumption, concealment and other conditions. When the activation vector is longer, the area and power consumption is higher, and the concealment and controllability is reduced. Therefore, the paper assumes that the attacker does not use an activation vector of length greater than 5 (usually less than 5). Under this premise, the greedy algorithm is adopted to formulate the greedy strategy to generate the test vector set.

    Algorithm 1 is the test vector generation algorithm based on the greedy algorithm. There are four parameters:n, the number of parameters in the test vector;t, the combinatorial correlation coefficient (i.e., the longest hardware Trojan activation vector length);us, the uncovered combination array that is calculated according tonandt;ts, the test vector set. The process of generating the test vector set is divided into two steps, the first step is to initialize parameters and calculate theus(line 1 to 2). The second step is to use the greedy algorithm to loop iterations that generate a test vector one by one until the test vector set ts is obtained (line 3 to 15). In the second step, the first vector is generated randomly (line 5). The following vectors are generated by loop iteration and each iterative round could generate a test vector (line 7 to 13). Update the values ofuswhile running the iterations in order to expand the vector. When theusis empty, end the iteration.tsis the final test vector set.

    Algorithm1Test vectors generation algorithm

    Algorithm2Greedy strategy

    Fig.2 Process of the test vector set generation

    2 Hardware Trojan Activation Scheme Design in Cryptographic Algorithm

    2.1 Target circuits design

    In this paper, the hardware implementation of AES symmetric encryption algorithm was used as the original circuit, and hardware Trojans of the different activation length were designed to insert the original circuit. These circuits act as target circuits[13]. The AES module inputs the 128-bit keys (key) and the 128-bit plaintexts/ciphertexts (data_in), outputs the 128-bit ciphertexts / plaintexts (data_out), and controls the encryption or decryption operations of the module through the control signal (en_de).

    Fig.3 Hardware Trojan design

    The operation of the AES module can be divided into two phases. The first phase is to expand the key according to the input 128-bit keys, and expand sub-keys of 10 rounds. The second phase is to encrypt or decrypt through the control signal (en_de). After 10 rounds of operation, the ciphertext or plaintext is outputed. Fig.3 describes a hardware Trojan. The length of activation is 4, i.e. the trigger logic consists of 4 inputs (21, 79, 97, 119). The load logic is an XOR gate. This function is to make the encryption control bit (en_de) invert. Hardware Trojan will implement denial of service attacks, resulting in AES module cannot be normal operation, the output value will be wrong. In addition, the hardware trojans of the activation length were 5(namely: 3,23,89,107,124), 3(namely: 21,79,114) and 2(namely: 21,114). These were also designed and inserted into the AES module.

    Tab.2 Number of combination values for the attackers

    2.2 Test vector generation scheme design

    In section 1.3, the method of generating test vector set based on greedy algorithm was pro-posed, and the process of generating test vector setts(6, 2) was given whenn=6 andt=2. For the detection of AES cryptographic algorithm circuit, the number of input parameters was set asn=128. According to the proposed generation algorithm, the test vector sets with different combinations correlation coefficients (t=2, 3 and 4 respectively) were generated. Fig.4 is a test vector generation process when the combination correlation coefficientt=2 was used. When the correlation coefficient was taken from other values, the test vector set was generated according to this process.

    Fig.4 Process of test vector generation

    3 Experiment and Results

    3.1 Experimental process

    Fig.5 Experiment process

    To verify the proposed hardware Trojan detection method, this paper was verified by the experimental process shown in Fig.5. The process mainly consists of three parts. The first part was the original circuit design and hardware Trojan insertion and constitutes the target circuit. The second part was the use of the proposed detection method to generate test vector set. The third part was to obtain the standard reference value by using the software method to implement the cryptographic algorithm.

    At first, the paper designed the AES encryption circuit as the original circuit without hardware Trojan infection, combination hardware Trojans with activation length 2, 3, 4, 5 were inserted into the original circuit as target circuits in Section 2.1. Then C language is used to realize the proposed hardware Trojan detection method and generate test vector setts(128,2),ts(128,3) andts(128,4) with input parametern=128,t=2,3,4 as the input of the hardware part and software in Section 2.2. Finally, the software implementation of the AES encryption algorithm was carried out, according to the inputts(128,2),ts(128,3) andts(128,4). The standard results were calculated as reference values, and the hardware and software outputs were compared to determine whether there was hardware Trojan. In the whole process, visual studio was used to compile the C language and generate the test vectors, modelsim was used to verify and simulate, and FPGA was used as the platform of prototype verification.

    3.2 Results and discussion

    In the process of the experiment, the paper carried out the hardware Trojan detection experiment for the 128-bit AES cryptographic algorithm circuit using the proposed method. Experiments were conducted on two aspects respectively and the results were recorded.

    Tab.3 is the data obtained by experiments using the greedy algorithm proposed in this paper, and is compared with the method proposed in Ref. [9]. In Tab.3, the hardware Trojan activation length of the experimental object is 3. This is the trigger unit associated with 3 input bits. The second and third columns is the experimental results to generate test vector sets based on greedy algorithm. The second column shows the length of different test vector sets generated by different combination correlation coefficients. The third column shows corresponding times at which the test vector sets could activate the hardware Trojan. The latter two columns are experimental data obtained by using the method in Ref.[9]. By contrast, although the proposed method of the paper has a longer test vector, it can increase the time that the hardware Trojan was activated, improve the detection success rate, and have higher practicability.

    Tab.3 Greedy algorithm vs. Ref. [9]

    Tab.4 shows the experimental results obtained for hardware Trojans of different activation lengths, using the proposed method of detection. The first column shows the hardware Trojan activation length, the second column shows the position of the triggers of different hardware Trojans, the last three columns shows times that the test vector sets could activate hardware trojan under different correlation coefficients. Experimental results show that the test vector sets generated by the proposed method can effectively realize the activation of hardware Trojans with different activation lengths and achieve the purpose of detecting hardware Trojan.

    Tab.4 Activation number of different Trojans

    Therefore, the paper proposes a hardware Trojan activation method based on greedy algorithm, which could effectively activate the hardware Trojan, increase the times that hardware Trojans are activated, has a strong practical value, and a wide range of applications.

    4 Conclusion

    The paper proposed a hardware Trojan activation method based on greedy algorithm for detecting hardware Trojan. Experimental results show that test vector sets generated using the proposed method could effectively improve probability of hardware Trojan activation and also enhance applicability and practicability of test vector sets. Based on the method proposed in this paper, the two aspects could be studied in future work, respectively detecting sequential hardware Trojans effectively and decreasing the size of test vector sets.

    [1] George R. Why we should worry about the supply chain[J]. International Journal of Critical Infrastructure Protection, 2015, 11: 22-23.

    [2] Liu Huafeng, Luo Hongwei, Wang Liwei. Survey on hardware Trojan horse[J]. Microelectronics, 2011, 41(5):709-713. (in Chinese)

    [3] Niu Xiaopeng, Li Qingbao, Wang Wei, et al. Survey on the hardware Trojan technologies[J]. Journal of Information Engineering University, 2012, 13(6):740-748. (in Chinese)

    [4] Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: Challenges and solutions[C]∥IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2008.

    [5] Li H, Liu Q, Zhang J, et al. A survey of hardware Trojan detection, diagnosis and prevention[C]∥International Conference on Computer-Aided Design and Computer Graphics, Xi’an, China, 2016.

    [6] Francq J, Frick F. Introduction to hardware Trojan detection methods[C]∥Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2015.

    [7] Kitsos P, Simos D E, Torres-jimenez J, et al. Exciting FPGA cryptographic Trojans using combinatorial testing[C]∥International Symposium on Software Reliability Engineering, Gaithersbury, MD, USA, 2016.

    [8] Pei Gen, Shi Chaoyang, Zou Xuecheng, et al. A hardware Trojan detection method based on rapid activation[J]. Application of Electronic Technique, 2016, 42(8):63-66. (in Chinese)

    [9] Voyiatzis A G, Stefanidis K G, Kitsos P. Efficient triggering of Trojan hardware logic[C]∥IEEE International Symposium on Design & Diagnostics of Electronic Circuits & Systems, Kosice, Slovakia, 2016.

    [10] Kitsos P, Voyiatzis A G. Towards a hardware Trojan detection methodology[C]∥Embedded Computing, Budva, Montenegro, 2014.

    [11] Li Ling. Research on SAT-based test generation algorithm for integrated circuits [D]. Harbin: Harbin Engineering University, 2012. (in Chinese)

    [12] Tang D T, Woo L S. Exhaustive test pattern generation with constant weight vectors[J]. IEEE Transactions on Computers, 1984, 32(12):1145-1150.

    [13] Kumar K S, Chanamala R, Sahoo S R, et al. An improved AES hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow[C]∥International Symposium on VLSI Design and Test, Ahmedabad, India, 2015.

    国产精品久久久久成人av| 五月天丁香电影| 亚洲一区中文字幕在线| 丝瓜视频免费看黄片| 久久狼人影院| 最近中文字幕2019免费版| 亚洲av国产av综合av卡| 国产男人的电影天堂91| 久久精品国产综合久久久| 天堂俺去俺来也www色官网| tube8黄色片| 考比视频在线观看| 最近最新免费中文字幕在线| 法律面前人人平等表现在哪些方面 | 成人三级做爰电影| 亚洲 欧美一区二区三区| 中文字幕精品免费在线观看视频| 午夜视频精品福利| 一本一本久久a久久精品综合妖精| 欧美在线一区亚洲| 国产男女内射视频| 欧美精品啪啪一区二区三区 | 亚洲精品自拍成人| 国产成人欧美在线观看 | 男女国产视频网站| 亚洲专区国产一区二区| 国产av一区二区精品久久| 国产有黄有色有爽视频| 日韩制服骚丝袜av| 国产99久久九九免费精品| 精品少妇一区二区三区视频日本电影| 国产又爽黄色视频| 国产福利在线免费观看视频| 可以免费在线观看a视频的电影网站| 亚洲中文日韩欧美视频| 亚洲av成人不卡在线观看播放网 | 热re99久久国产66热| 国产无遮挡羞羞视频在线观看| 久热这里只有精品99| 免费观看人在逋| 亚洲精品自拍成人| 色婷婷av一区二区三区视频| 一进一出抽搐动态| bbb黄色大片| 亚洲一卡2卡3卡4卡5卡精品中文| 在线观看免费午夜福利视频| 免费高清在线观看视频在线观看| 少妇被粗大的猛进出69影院| 欧美午夜高清在线| 国产91精品成人一区二区三区 | 久久亚洲国产成人精品v| 国产精品九九99| 国产熟女午夜一区二区三区| 丝袜美足系列| 国产一区有黄有色的免费视频| 国产亚洲欧美在线一区二区| e午夜精品久久久久久久| 中文字幕av电影在线播放| 动漫黄色视频在线观看| 亚洲精品美女久久av网站| 黄片大片在线免费观看| 午夜免费鲁丝| 狠狠精品人妻久久久久久综合| 亚洲成av片中文字幕在线观看| 最新的欧美精品一区二区| 国产成人啪精品午夜网站| 又黄又粗又硬又大视频| 美女午夜性视频免费| 亚洲性夜色夜夜综合| 国产成人av教育| 国产av国产精品国产| 妹子高潮喷水视频| 宅男免费午夜| 两个人免费观看高清视频| 人妻久久中文字幕网| 亚洲欧美成人综合另类久久久| 亚洲天堂av无毛| 精品久久久久久电影网| 亚洲综合色网址| √禁漫天堂资源中文www| 国产成人av激情在线播放| 色综合欧美亚洲国产小说| 免费少妇av软件| 亚洲美女黄色视频免费看| 精品少妇黑人巨大在线播放| 曰老女人黄片| 色视频在线一区二区三区| 99久久国产精品久久久| 亚洲av美国av| 在线观看www视频免费| 黄片播放在线免费| 在线观看免费日韩欧美大片| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲成人免费电影在线观看| 搡老熟女国产l中国老女人| 麻豆乱淫一区二区| 久久天堂一区二区三区四区| 免费观看a级毛片全部| 精品第一国产精品| 久久久久久久国产电影| 国产男女超爽视频在线观看| 少妇被粗大的猛进出69影院| 免费人妻精品一区二区三区视频| 一级毛片精品| 999久久久国产精品视频| 岛国毛片在线播放| 大码成人一级视频| 亚洲精品一卡2卡三卡4卡5卡 | 两人在一起打扑克的视频| 丝袜美足系列| 在线观看免费视频网站a站| 亚洲av日韩在线播放| 欧美日韩亚洲国产一区二区在线观看 | 在线看a的网站| 菩萨蛮人人尽说江南好唐韦庄| 亚洲国产欧美网| 97在线人人人人妻| 亚洲av欧美aⅴ国产| 国产高清国产精品国产三级| 天天躁夜夜躁狠狠躁躁| 美女高潮到喷水免费观看| 老司机午夜十八禁免费视频| 亚洲国产欧美网| 男女午夜视频在线观看| 免费观看av网站的网址| 自拍欧美九色日韩亚洲蝌蚪91| 岛国在线观看网站| 亚洲av美国av| 亚洲成国产人片在线观看| 欧美国产精品va在线观看不卡| 欧美在线黄色| 成年人黄色毛片网站| 天堂8中文在线网| 亚洲国产欧美日韩在线播放| 免费高清在线观看日韩| 国产精品 欧美亚洲| 啦啦啦啦在线视频资源| 国产免费现黄频在线看| 亚洲精品国产一区二区精华液| 国产免费一区二区三区四区乱码| avwww免费| 亚洲av欧美aⅴ国产| 久久久精品94久久精品| 人妻人人澡人人爽人人| 亚洲,欧美精品.| 麻豆av在线久日| 亚洲国产欧美在线一区| 午夜激情av网站| 日韩欧美一区二区三区在线观看 | 欧美日韩精品网址| 国产无遮挡羞羞视频在线观看| www.av在线官网国产| 男女边摸边吃奶| 日本vs欧美在线观看视频| 久久青草综合色| 久久久久久亚洲精品国产蜜桃av| 成年人免费黄色播放视频| 欧美97在线视频| 欧美变态另类bdsm刘玥| 狠狠婷婷综合久久久久久88av| 国产av又大| 菩萨蛮人人尽说江南好唐韦庄| 黄色怎么调成土黄色| 久久久久国产精品人妻一区二区| 在线观看人妻少妇| 日本黄色日本黄色录像| 一级,二级,三级黄色视频| 久久国产精品人妻蜜桃| 国产亚洲av片在线观看秒播厂| 在线看a的网站| 国产人伦9x9x在线观看| 老熟妇仑乱视频hdxx| 黑丝袜美女国产一区| 一级片'在线观看视频| 一边摸一边抽搐一进一出视频| 少妇被粗大的猛进出69影院| 久久久国产成人免费| 一本久久精品| 亚洲国产精品999| 欧美日韩一级在线毛片| 一区二区三区乱码不卡18| 亚洲第一av免费看| 制服诱惑二区| 一区二区三区乱码不卡18| 日韩欧美一区视频在线观看| 国产色视频综合| netflix在线观看网站| 国产精品香港三级国产av潘金莲| 免费观看a级毛片全部| 国产亚洲精品一区二区www | 欧美亚洲日本最大视频资源| 51午夜福利影视在线观看| 久久久精品94久久精品| 日本五十路高清| 精品福利永久在线观看| 精品卡一卡二卡四卡免费| 国产高清视频在线播放一区 | 电影成人av| 成人国产一区最新在线观看| 亚洲成人免费av在线播放| 中文字幕人妻丝袜一区二区| 久久久久国内视频| 亚洲国产欧美在线一区| 国产在视频线精品| 国产欧美日韩一区二区三区在线| 日韩,欧美,国产一区二区三区| 亚洲人成电影免费在线| 亚洲精品成人av观看孕妇| 欧美日本中文国产一区发布| 欧美亚洲 丝袜 人妻 在线| 在线av久久热| 满18在线观看网站| 麻豆国产av国片精品| 日韩制服骚丝袜av| 日日爽夜夜爽网站| 韩国高清视频一区二区三区| 精品一区二区三卡| 黄频高清免费视频| 久久青草综合色| 在线观看一区二区三区激情| 一区在线观看完整版| 亚洲va日本ⅴa欧美va伊人久久 | 国产极品粉嫩免费观看在线| 午夜激情av网站| 19禁男女啪啪无遮挡网站| 亚洲综合色网址| 女人被躁到高潮嗷嗷叫费观| 免费看十八禁软件| 日韩免费高清中文字幕av| 五月天丁香电影| 国产一卡二卡三卡精品| 久久久国产一区二区| 亚洲精品在线美女| 大型av网站在线播放| 亚洲 欧美一区二区三区| 日韩视频在线欧美| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲精品第二区| 午夜福利免费观看在线| 国产激情久久老熟女| 欧美日韩亚洲高清精品| a级毛片在线看网站| 啦啦啦视频在线资源免费观看| 免费少妇av软件| 亚洲人成电影免费在线| 国产精品一二三区在线看| 香蕉丝袜av| 午夜免费鲁丝| 欧美午夜高清在线| 老司机福利观看| 国产一级毛片在线| 中国美女看黄片| 99九九在线精品视频| a级片在线免费高清观看视频| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品第二区| 俄罗斯特黄特色一大片| 亚洲 欧美一区二区三区| 欧美黑人精品巨大| 爱豆传媒免费全集在线观看| 久久人人97超碰香蕉20202| cao死你这个sao货| 天天躁日日躁夜夜躁夜夜| 国产一卡二卡三卡精品| √禁漫天堂资源中文www| 亚洲av成人不卡在线观看播放网 | 18禁观看日本| 精品免费久久久久久久清纯 | 黑人猛操日本美女一级片| 欧美日韩亚洲高清精品| 国产一区二区三区av在线| 又黄又粗又硬又大视频| 久久久久精品人妻al黑| 亚洲情色 制服丝袜| 波多野结衣av一区二区av| 国产色视频综合| 99国产精品一区二区三区| 精品乱码久久久久久99久播| svipshipincom国产片| 丝瓜视频免费看黄片| 久久性视频一级片| 亚洲欧美日韩另类电影网站| av网站免费在线观看视频| 大片免费播放器 马上看| 亚洲第一av免费看| 三级毛片av免费| 性色av一级| 在线看a的网站| 日日夜夜操网爽| 波多野结衣av一区二区av| 亚洲美女黄色视频免费看| 一边摸一边抽搐一进一出视频| 国产精品一区二区在线观看99| 亚洲精品国产一区二区精华液| 丝瓜视频免费看黄片| 亚洲七黄色美女视频| 91麻豆av在线| 真人做人爱边吃奶动态| 制服诱惑二区| svipshipincom国产片| 亚洲精品一卡2卡三卡4卡5卡 | 啦啦啦 在线观看视频| 性少妇av在线| 无限看片的www在线观看| 久久精品国产亚洲av香蕉五月 | 伊人久久大香线蕉亚洲五| 国产成人影院久久av| 王馨瑶露胸无遮挡在线观看| 亚洲av美国av| 亚洲av电影在线观看一区二区三区| 国产亚洲av片在线观看秒播厂| 后天国语完整版免费观看| av不卡在线播放| 欧美在线黄色| 国产亚洲一区二区精品| 精品亚洲成国产av| 国产有黄有色有爽视频| 2018国产大陆天天弄谢| 国产日韩欧美视频二区| 国产精品二区激情视频| 亚洲国产av影院在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 三上悠亚av全集在线观看| 伊人亚洲综合成人网| 91九色精品人成在线观看| 日韩,欧美,国产一区二区三区| 中文字幕最新亚洲高清| 18禁国产床啪视频网站| 91大片在线观看| 久久亚洲精品不卡| 国产亚洲午夜精品一区二区久久| 午夜福利视频在线观看免费| 久久这里只有精品19| 国产高清视频在线播放一区 | 亚洲伊人色综图| 欧美成狂野欧美在线观看| 久久ye,这里只有精品| 精品一区二区三区av网在线观看 | 国产男人的电影天堂91| 大片电影免费在线观看免费| 色视频在线一区二区三区| 下体分泌物呈黄色| 亚洲精品一区蜜桃| www.999成人在线观看| 一级,二级,三级黄色视频| 亚洲情色 制服丝袜| 日韩欧美国产一区二区入口| 欧美精品一区二区大全| 99国产精品99久久久久| 搡老岳熟女国产| 免费高清在线观看视频在线观看| 国产成+人综合+亚洲专区| 国产av一区二区精品久久| 欧美日韩福利视频一区二区| 无限看片的www在线观看| 国产不卡av网站在线观看| 久久这里只有精品19| 欧美精品亚洲一区二区| 视频区欧美日本亚洲| 亚洲综合色网址| 999久久久精品免费观看国产| 国产男女超爽视频在线观看| 正在播放国产对白刺激| 国产不卡av网站在线观看| 久久久久精品国产欧美久久久 | 亚洲伊人久久精品综合| 极品少妇高潮喷水抽搐| 女人精品久久久久毛片| 亚洲第一av免费看| 免费久久久久久久精品成人欧美视频| 精品一品国产午夜福利视频| 欧美中文综合在线视频| 日韩一卡2卡3卡4卡2021年| 欧美 日韩 精品 国产| 免费观看a级毛片全部| 老司机靠b影院| 青草久久国产| 欧美日韩亚洲高清精品| 国产麻豆69| 99久久人妻综合| 亚洲国产av影院在线观看| 亚洲伊人色综图| 老司机午夜十八禁免费视频| 午夜福利视频在线观看免费| 久久久国产一区二区| 日韩电影二区| 国产高清videossex| 欧美97在线视频| av网站在线播放免费| 欧美精品高潮呻吟av久久| 久久久久久亚洲精品国产蜜桃av| 精品国产一区二区三区四区第35| 夫妻午夜视频| 亚洲国产精品999| 国产精品一区二区免费欧美 | 99久久综合免费| 人人妻人人澡人人爽人人夜夜| 精品国内亚洲2022精品成人 | 水蜜桃什么品种好| 少妇精品久久久久久久| 美女大奶头黄色视频| 一级毛片电影观看| 欧美av亚洲av综合av国产av| 汤姆久久久久久久影院中文字幕| 真人做人爱边吃奶动态| 美女中出高潮动态图| 91国产中文字幕| 亚洲成人手机| 涩涩av久久男人的天堂| 一区二区av电影网| 欧美日韩亚洲高清精品| 欧美亚洲 丝袜 人妻 在线| 搡老熟女国产l中国老女人| 18禁观看日本| 亚洲一码二码三码区别大吗| 91大片在线观看| 丝袜在线中文字幕| 啪啪无遮挡十八禁网站| 亚洲午夜精品一区,二区,三区| 国产成人精品无人区| 亚洲精品国产av成人精品| 在线观看免费视频网站a站| 亚洲国产欧美在线一区| 新久久久久国产一级毛片| 中国美女看黄片| 一边摸一边抽搐一进一出视频| 国产精品自产拍在线观看55亚洲 | 亚洲精品自拍成人| 男人爽女人下面视频在线观看| 热99久久久久精品小说推荐| 男女免费视频国产| 精品卡一卡二卡四卡免费| 女性生殖器流出的白浆| 精品欧美一区二区三区在线| 亚洲三区欧美一区| 日韩欧美一区二区三区在线观看 | 欧美久久黑人一区二区| 久久久精品免费免费高清| 自拍欧美九色日韩亚洲蝌蚪91| 国产成人欧美| 伊人亚洲综合成人网| 欧美人与性动交α欧美软件| 俄罗斯特黄特色一大片| 欧美日韩国产mv在线观看视频| 亚洲成人国产一区在线观看| 成人三级做爰电影| 一个人免费看片子| 欧美黄色淫秽网站| 精品人妻1区二区| 国产成人精品久久二区二区91| 亚洲va日本ⅴa欧美va伊人久久 | 国产亚洲欧美精品永久| 男女午夜视频在线观看| 极品人妻少妇av视频| 亚洲全国av大片| 亚洲人成电影观看| 国产精品久久久久久精品电影小说| 亚洲欧美清纯卡通| 日韩欧美一区视频在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 欧美+亚洲+日韩+国产| 又大又爽又粗| 久久人人爽人人片av| 国产免费福利视频在线观看| 欧美人与性动交α欧美软件| 免费观看人在逋| 超碰成人久久| 久久国产精品大桥未久av| 久久久久久久久免费视频了| 日韩欧美一区视频在线观看| 精品欧美一区二区三区在线| 国产又爽黄色视频| 成人国语在线视频| 好男人电影高清在线观看| 丝袜人妻中文字幕| 曰老女人黄片| 51午夜福利影视在线观看| 日本av手机在线免费观看| 国产免费av片在线观看野外av| 日韩大片免费观看网站| 久久久久久人人人人人| 一级片免费观看大全| 日韩免费高清中文字幕av| 午夜福利免费观看在线| 国产99久久九九免费精品| 黄片小视频在线播放| 国产激情久久老熟女| 国产真人三级小视频在线观看| 一本—道久久a久久精品蜜桃钙片| 人人妻,人人澡人人爽秒播| 少妇精品久久久久久久| 麻豆av在线久日| 黑人操中国人逼视频| 欧美激情极品国产一区二区三区| 久久综合国产亚洲精品| 日韩欧美一区视频在线观看| 国产成人免费观看mmmm| 成年av动漫网址| 国产色视频综合| 亚洲熟女毛片儿| 丝袜人妻中文字幕| 亚洲专区国产一区二区| av超薄肉色丝袜交足视频| 九色亚洲精品在线播放| 欧美日韩福利视频一区二区| 日韩 欧美 亚洲 中文字幕| 人人澡人人妻人| 久久久国产精品麻豆| 男人爽女人下面视频在线观看| 成人手机av| 久久精品国产a三级三级三级| 欧美另类亚洲清纯唯美| 国产在线视频一区二区| 国产在视频线精品| 国产成人影院久久av| 日韩制服丝袜自拍偷拍| 老司机午夜福利在线观看视频 | 欧美97在线视频| 黄色a级毛片大全视频| 亚洲九九香蕉| 久久久精品区二区三区| 久久九九热精品免费| 国产野战对白在线观看| 亚洲av电影在线观看一区二区三区| 亚洲精品粉嫩美女一区| 午夜91福利影院| 永久免费av网站大全| 老司机靠b影院| 狂野欧美激情性xxxx| 欧美黑人欧美精品刺激| 国产精品久久久久成人av| 人成视频在线观看免费观看| 亚洲精品国产区一区二| av又黄又爽大尺度在线免费看| 日本精品一区二区三区蜜桃| 91九色精品人成在线观看| 18在线观看网站| 国产高清视频在线播放一区 | 欧美激情 高清一区二区三区| 9191精品国产免费久久| 久久久久国内视频| 新久久久久国产一级毛片| 国产高清国产精品国产三级| 黄色视频,在线免费观看| 亚洲成人免费电影在线观看| 菩萨蛮人人尽说江南好唐韦庄| 国产精品国产av在线观看| 亚洲中文日韩欧美视频| 人成视频在线观看免费观看| av免费在线观看网站| 香蕉国产在线看| 黄色 视频免费看| 美女主播在线视频| av线在线观看网站| 久久狼人影院| 最黄视频免费看| 乱人伦中国视频| 人妻久久中文字幕网| 国产在线观看jvid| 亚洲avbb在线观看| 18禁国产床啪视频网站| 夫妻午夜视频| 黑人巨大精品欧美一区二区蜜桃| 精品久久久久久电影网| tube8黄色片| 人妻久久中文字幕网| 国产精品久久久人人做人人爽| 国产高清videossex| 人妻一区二区av| 日日爽夜夜爽网站| 亚洲久久久国产精品| 亚洲精品国产一区二区精华液| 少妇被粗大的猛进出69影院| 成人影院久久| 91精品三级在线观看| 亚洲中文日韩欧美视频| 叶爱在线成人免费视频播放| 精品少妇内射三级| 啦啦啦 在线观看视频| 精品少妇内射三级| 国产亚洲精品久久久久5区| 亚洲一区中文字幕在线| 日韩大码丰满熟妇| 国产精品一二三区在线看| 在线观看免费日韩欧美大片| 午夜精品国产一区二区电影| 桃花免费在线播放| 午夜影院在线不卡| av又黄又爽大尺度在线免费看| 日韩欧美一区视频在线观看| 青青草视频在线视频观看| 亚洲国产精品一区二区三区在线| 久久人人97超碰香蕉20202| av天堂久久9| 欧美xxⅹ黑人| 男人舔女人的私密视频| 久久久精品94久久精品| 少妇裸体淫交视频免费看高清 | 99国产精品免费福利视频| 黄色毛片三级朝国网站| 久久久欧美国产精品| 国产黄频视频在线观看| 午夜视频精品福利| 桃花免费在线播放| 一区福利在线观看| 两个人看的免费小视频| 新久久久久国产一级毛片| 午夜久久久在线观看| 十八禁网站网址无遮挡| 一区二区三区乱码不卡18| 美女大奶头黄色视频| 国产精品久久久久久精品古装| 菩萨蛮人人尽说江南好唐韦庄| 日韩 欧美 亚洲 中文字幕| 中国国产av一级|