期刊文献+

基于旁路分析的硬件木马检测方法 被引量:8

Side-Channel Analysis-Based Detection Approach of Hardware Trojans
下载PDF
导出
摘要 集成电路芯片在不受控的制造过程中可能会被嵌入恶意电路结构,形成硬件木马,这给集成电路芯片的可靠性和可信度带来了极大的隐患,而利用传统的测试技术很难发现这些硬件木马.针对这一问题,文中提出了一种非破坏性的、基于旁路分析的硬件木马检测方法,它通过对芯片功耗瞬态变化情况的分析,采用奇异值分解算法对功耗进行统计处理来检测芯片中的硬件木马.在FPGA芯片上的硬件验证结果表明,即使在测量噪声和工艺扰动较大的环境中,文中方法也能检测出面积比原始电路小2个数量级的硬件木马. During the fabrication of integrated circuit(IC) chips in untrusted foundries,malicious circuits may be inserted as hardware Trojans,which results in a significant risk of trustworthiness and reliability degradation of the chips.As such Trojan circuits are difficult to detect using conventional strategies,a nondestructive side-channel analysis-based detection approach is proposed,which employs the algorithm of singular value decomposition to analyze and statistically process the transient power of IC chips.Validation results of the approach on FPGA chips show that,even in the presence of big noise and process variation,the proposed approach is effective in detecting the hardware Trojans that are 2 orders of magnitude smaller than the original circuit.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第6期6-10,共5页 Journal of South China University of Technology(Natural Science Edition)
基金 总装备部预研项目(51308040413) 总装备部元器件共性课题(1004GK0023)
关键词 硬件木马 旁路分析 奇异值分解 hardware Trojans side-channel analysis singular value decomposition
  • 相关文献

参考文献13

  • 1DARPA. Trust in integrated circuits-proposer information pamphlet [ EB/OL ]. ( 2007- 07- 24 ) [ 2011- 08-11 ]. http : //www. darpa, mil/MTO/solicitations/baa07-24/index. html.
  • 2Defense Science Board. High performance microchip sup- ply [ EB/OL]. ( 2005- 02- 21 ) [ 2011- 08- 11 ]. http :// www. acq. osd. mil/dsb/reports/2005-02-HPMS_Report_ Final. pdf.
  • 3Adee S. The hunt for the kill switch [ J ]. IEEE Spectrum, 2008,45 (5) :34-39.
  • 4Wang X, Tehranipoor M, Plusquellic J. Detecting mali- cious inclusions in secure hardware:challenges and solu- tions [ C ]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim:IEEE, 2008 : 15-19.
  • 5Tehranipoor M, Koushanfar F. A survey of hardware Tro- jan taxonomy and detection [ J ]. IEEE Design and Test of Computers ,2010,2( 1 ) : 10-25.
  • 6Chakraborty R, Narasimhan S, Bhunia S. Hardware Tro- jan : threats and emerging solutions [ C ]//Proceedings of IEEE Intenaational High Level Design Validation and Test Workshop. San Francisco : IEEE ,2009 : 166-171.
  • 7Jin Y, Kupp N, Makris Y. Experiences in hardware Trojan design and implementation [ C ] //Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Francisco : IEEE ,2009:50-57.
  • 8Agrawal D. Trojan detection using IC fingerprinting [ C]// Proceedings of IEEE Symposium on Security and Privacy. Berkeley : IEEE,2007 : 296- 310.
  • 9Wang Xiaoxiao, Salmani H, Tehranipoor M, et al. Hard- ware Trojan detection and isolation using current integra- tion and localized current analysis [ C ]//Proceedings of IEEE International Symposium on Defect and Fault Tole- rance of VLSI Systems. Boston : IEEE,2008:87-95.
  • 10Rad R M, Wang Xiaoxiao, Tehranipoor M, et al. Power supply signal calibration techniques for improving detec- tion resolution to hardware Trojans [ C ] //Proceedings of IEEE/ACM International Conference on Computer-Aided Design. San Jose : IEEE, 2008 : 632- 639.

同被引文献32

  • 1MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 2Goertzel K,Hamilton B.Integrated circuit security threats and hardware assurance countermeasures[C]∥Proc of College of Information Sciences and Technology.Pennsylvania:CiteSeer,2013:33-38.
  • 3Tehranipoor M,Koushanfar F.A survey of hardware trojan taxonomy and detection[J].IEEE Design and Test of Computers,2010,27(1):10-25.
  • 4Wang X,Tehranipoor M,Plusquellic J.Detecting malicious inclusions in secure hardware:challenges and solutions[C]∥Proc of Hardware-Oriented Security and Trust.Anaheim:IEEE,2008:15-19.
  • 5Chakraborty R,Narasimhan S,Bhunia S.Hardware Trojan:threats and emerging solutions[C]∥Proc of High Level Design Validation and Test Workshop.San Francisco:IEEE,2009:166-171.
  • 6Rai D,Lach J.Performance of delay-based Trojan detection techniques under parameter variations[C]∥Proc of Hardware-Oriented Security and Trust.Francisco:IEEE,2009:58-65.
  • 7Yier J,Makris Y.Hardware Trojan detection using path delay fingerprint[C]∥Proc of Hardware-Oriented Trust Security.Anaheim:IEEE,2008:51-57.
  • 8Agrawal D,Baktir S,Karakoyunlu D,et al.Trojan detection using IC fingerprinting[C]∥Proc of Security and Privacy.Berkeley:IEEE,2007:296-310.
  • 9Li H,Jiang T,Zhang K.Efficient and robust feature extraction by maximum margin criterion[J].IEEE Trans Neural Networks,2006,17(1):157-165.
  • 10任立儒.新情况下的特殊武器——硬件木马[J].中国电子科学研究院学报,2011,6(2):140-142. 被引量:2

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部