期刊文献+

硬件木马检测与防范研究综述 被引量:7

Overview of the detection and prevention study of hardware Trojans
下载PDF
导出
摘要 集成电路芯片的设计和制造是当今电子化产业中关键的组成部分,第三方技术服务的日益普及可能导致电路芯片在制造过程中被植入硬件木马,这对电子设备在安全性上带来了很大的挑战。在简单介绍硬件木马的概念的基础上,分析了硬件木马的组成与特点,然后重点探讨了现阶段硬件木马的检测和防范技术,最后对硬件木马的发展趋势进行了总结。 The design and manufacture of integrated circuit chips are now a key component of the electronic industry The increasing popularity of third-party technology services may lead to the implantation of hardware chips in the manufacturing process, which brings great challenge to the security of electronic devices. After introducing the con- cept of hardware Trojans, the characteristics and its forms were briefly analyzed. Then the detection technologies, and the prevention strategies of the hardware Trojans were discussed. At last, the development trend of the hardware Trojans was summarized.
作者 许强 蒋兴浩 姚立红 张志强 张诚 XU Qiang JIANG Xing-haol YAO Li-hong ZHANG Zhi-qiang ZHANG Cheng(School of Electronic Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China Shanghai Electro-Mechanical Engineering Institute, Shanghai 201109, China)
出处 《网络与信息安全学报》 2017年第4期1-13,共13页 Chinese Journal of Network and Information Security
基金 航天先进技术联合基金资助项目~~
关键词 集成电路芯片 硬件木马 检测 防范 integrated circuit chips, hardware Trojans, detection, prevention
  • 相关文献

参考文献9

二级参考文献108

  • 1谭学瑞,邓聚龙.灰色关联分析:多因素统计分析新方法[J].统计研究,1995,12(3):46-48. 被引量:333
  • 2张学工.模式识别[M].3版.北京:清华大学出版社,2010.
  • 3Wang Xiaoxiao,Tehranipoor M,Plusquellic J.Detecting Malicious Inclusions in Secure Hardware:Challenges and Solutions[C] //Proc.of the 1st International Workshop on Hardware Oriented Security and Trust.[S.l.] :IEEE Press,2008:15-19.
  • 4Defense Science Board.Defense Science Board Task Force on High Performance Microchip Supply[EB/OL].(2005-02-10).http://www.acq.osd.mil/dsb/reports/2005-02-HPMSReportFinal.pdf.
  • 5King S T,Tucek J,Cozzie A,et al.Designing and Implementing Malicious Hardware[C] //Proc.of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats.Berkeley,USA:USENIX Association,2008:1-8.
  • 6Agrawal D,Baktir S,Karakoyunlu D,et al.Trojan Detection Using IC Fingerprinting[C] //Proc.of IEEE Symposium on Security and Privacy.[S.l.] :IEEE Press,2007:296-310.
  • 7Lin Lang,Burleson W,Paar C.MOLES:Malicious Off-chip Leakage Enabled by Side-channels[C] //Pros.of International Conference on Computer-aided Design.San Jose,USA:[s.n.] ,2009.
  • 8金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 9Thomas DB. Cyclic expression of blood group determinants in murine cells and their relationship to growth control. Nature, 1971, 233∶317-321.
  • 10Wang Q, Stacy T, Binder M, et al. Disruption of the Cbfa2 gene causes necrosis and hemorrhaging in the central nervous system and blocks definitive hematopoiesis. Proc Natl Acad Sci U S A, 1996, 93∶3444-3449.

共引文献48

同被引文献40

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部