摘要
全球化商业模式下,电子计算机行业的设计人员需要利用不同国家或区域的设计/制造服务以及第三方知识产权(Third-Party Intellectual Property,3PIP)核来完成集成电路(Integrated Circuit,IC)的设计和制造.整个产业链上任何节点的漏洞都有可能成为攻击者实施攻击的入口,而硬件木马作为其中一个突出的安全威胁,已经成为IC设计与制造领域一个亟需解决的问题,有必要对其技术特点、研究现状和发展趋势进行梳理总结.该文首先简要介绍了硬件木马的基本概念和相关技术,对硬件木马的国内外研究成果和最新工作进行了整理归纳;讨论了硬件木马研究中的关键问题.该文针对硬件木马的研究热点内容进行了详细的对比总结,总结了当前研究工作的成果及存在的不足,讨论了硬件木马及相关技术的发展趋势.
As the design complexity and manufacturing costs of modern electronic devices continue to increase, designers shift toward utilizing the overseas design and manufacturing services and third-party intellectual property (3PIP) cores from different countries or regions to complete the entire design and manufacturing process of the integrated circuit (IC). However, the globalization trend and highly distributed characteristics of current IC design-fabrication flow have incurred the vulnerabilities of modern IC supply chain, which forms new attack sources. In this circumstance, rogue entities could malicious involve within any stage of the overall cycle life of the electronic electronics or ICs, resulting in the designers or customers of ICs begin to raise their doubts about the hardware level security and trustworthy of the products. There are various forms of existing and emerging security attacks in current industrial supply chain. As one of the most prominent security threats in current design and manufacturing area, hardware Trojan attack is now being considered as an urgent problem to be solved in information and hardware security domains. Such threat has aroused widespread concerns in academia and industry. What’s more, there have been a lot of survey research work on hardware Trojan and its associated techniques at home and abroad. Unfortunately, these surveys have some limitations more or less. For instance, some work only summarizes the progress of a certain stage or a certain detection approach, and most of the references for those research work were published before 2014, which could not represent the latest research progress and development trend in this area. In particular, with the deepening of research, novel hardware Trojan design and defense methods continue to emerge, thus making the hardware Trojan and its associated techniques also present some new features. In order to understand the hardware Trojan problems more comprehensively and illustrate the latest research progress and development trend in recent years, it is necessary to re - sort out its technical characteristics, research status, and development trends. In this article, we first present a brief description of the basic concept, composition, attack mechanism, classification, and other related techniques in hardware Trojan, and summarizes current research achievements and the latest advances at home and abroad. It then discusses the key problems for the research of hardware Trojan, concluding seven types of research hotspots, i.e., hardware Trojan design, Trojan detection techniques, design-for-trust mechanisms, runtime defense, component level protection, architecture level protection, evaluation and analysis. After that, this article makes a detailed summary and comparison of the research progress for each type of the research hotspots, and makes a comment on the current research works and the problems, application stages, tools, working principles, applicable scenarios, and characteristics existing in the current study respectively. Finally, this paper also discusses the development trend for hardware Trojan research and the relevant techniques in the future, which would be helpful to clearly demonstrate the challenges faced in current research work, promote the research and development of hardware Trojan detection and corresponding security protection technology, and provide a valuable opportunity for researchers those who want to engage in hardware Trojan and its related technology research.
作者
黄钊
王泉
杨鹏飞
HUANG Zhao;WANG Quan;YANG Peng-Fei(School of Computer Science and Technology, Xidian University, Xi’an 710071)
出处
《计算机学报》
EI
CSCD
北大核心
2019年第5期993-1017,共25页
Chinese Journal of Computers
基金
国家自然科学基金项目(61572385
61702395
61711530248)
陕西省科技统筹创新工程计划项目(2015KTCXSF-01)资助~~
关键词
硬件安全
硬件木马设计
安全防护技术
评估与分析
hardware security
hardware Trojan design
countermeasures
evaluation and analysis