期刊文献+

硬件木马:关键问题研究进展及新动向 被引量:15

Hardware Trojan:Research Progress and New Trends on Key Problems
下载PDF
导出
摘要 全球化商业模式下,电子计算机行业的设计人员需要利用不同国家或区域的设计/制造服务以及第三方知识产权(Third-Party Intellectual Property,3PIP)核来完成集成电路(Integrated Circuit,IC)的设计和制造.整个产业链上任何节点的漏洞都有可能成为攻击者实施攻击的入口,而硬件木马作为其中一个突出的安全威胁,已经成为IC设计与制造领域一个亟需解决的问题,有必要对其技术特点、研究现状和发展趋势进行梳理总结.该文首先简要介绍了硬件木马的基本概念和相关技术,对硬件木马的国内外研究成果和最新工作进行了整理归纳;讨论了硬件木马研究中的关键问题.该文针对硬件木马的研究热点内容进行了详细的对比总结,总结了当前研究工作的成果及存在的不足,讨论了硬件木马及相关技术的发展趋势. As the design complexity and manufacturing costs of modern electronic devices continue to increase, designers shift toward utilizing the overseas design and manufacturing services and third-party intellectual property (3PIP) cores from different countries or regions to complete the entire design and manufacturing process of the integrated circuit (IC). However, the globalization trend and highly distributed characteristics of current IC design-fabrication flow have incurred the vulnerabilities of modern IC supply chain, which forms new attack sources. In this circumstance, rogue entities could malicious involve within any stage of the overall cycle life of the electronic electronics or ICs, resulting in the designers or customers of ICs begin to raise their doubts about the hardware level security and trustworthy of the products. There are various forms of existing and emerging security attacks in current industrial supply chain. As one of the most prominent security threats in current design and manufacturing area, hardware Trojan attack is now being considered as an urgent problem to be solved in information and hardware security domains. Such threat has aroused widespread concerns in academia and industry. What’s more, there have been a lot of survey research work on hardware Trojan and its associated techniques at home and abroad. Unfortunately, these surveys have some limitations more or less. For instance, some work only summarizes the progress of a certain stage or a certain detection approach, and most of the references for those research work were published before 2014, which could not represent the latest research progress and development trend in this area. In particular, with the deepening of research, novel hardware Trojan design and defense methods continue to emerge, thus making the hardware Trojan and its associated techniques also present some new features. In order to understand the hardware Trojan problems more comprehensively and illustrate the latest research progress and development trend in recent years, it is necessary to re - sort out its technical characteristics, research status, and development trends. In this article, we first present a brief description of the basic concept, composition, attack mechanism, classification, and other related techniques in hardware Trojan, and summarizes current research achievements and the latest advances at home and abroad. It then discusses the key problems for the research of hardware Trojan, concluding seven types of research hotspots, i.e., hardware Trojan design, Trojan detection techniques, design-for-trust mechanisms, runtime defense, component level protection, architecture level protection, evaluation and analysis. After that, this article makes a detailed summary and comparison of the research progress for each type of the research hotspots, and makes a comment on the current research works and the problems, application stages, tools, working principles, applicable scenarios, and characteristics existing in the current study respectively. Finally, this paper also discusses the development trend for hardware Trojan research and the relevant techniques in the future, which would be helpful to clearly demonstrate the challenges faced in current research work, promote the research and development of hardware Trojan detection and corresponding security protection technology, and provide a valuable opportunity for researchers those who want to engage in hardware Trojan and its related technology research.
作者 黄钊 王泉 杨鹏飞 HUANG Zhao;WANG Quan;YANG Peng-Fei(School of Computer Science and Technology, Xidian University, Xi’an 710071)
出处 《计算机学报》 EI CSCD 北大核心 2019年第5期993-1017,共25页 Chinese Journal of Computers
基金 国家自然科学基金项目(61572385 61702395 61711530248) 陕西省科技统筹创新工程计划项目(2015KTCXSF-01)资助~~
关键词 硬件安全 硬件木马设计 安全防护技术 评估与分析 hardware security hardware Trojan design countermeasures evaluation and analysis
  • 相关文献

参考文献8

二级参考文献82

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2罗宏伟.集成电路芯片安全隐患检测技术[J].半导体技术,2007,32(12):1094-1097. 被引量:5
  • 3Tehranipoor M,Koushanfar F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design&Test of Computers,2010,27(1):10-25.
  • 4Rostami M,Koushanfar F,Rajendran J,et al.Hardware security:threat models and metrics[C]∥Proceedings of the International Conference on ComputerAided Design.New York:IEEE Press,2013:819-823.
  • 5Narasimhan S,Du D,Chakraborty R S,et al.Hardware trojan detection by multiple-parameter sidechannel analysis[J].IEEE Transactions on Computers,2013,62(11):2183-2195.
  • 6Wang C,Li J,Yu M,et al.An intelligent classification method for Trojan detection based on side-channel analysis[J].IEICE Electronics Express,2013,10(17):1-6.
  • 7Reece T,Robinson W H.Analysis of data-leak hardware Trojans in AES cryptographic circuits[C]∥Proc of Technologies for Homeland Security(HST),New York:IEEE Press,2013:467-472.
  • 8Agrawal D,Baktir S,Karakoyunlu D,et al.Trojan Detection Using IC Fingerprinting[C]//Proceedings of IEEE Sympo-sium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:296-310.
  • 9Tehranipoor M,Koushanfar F.A Survey of Hardware Trojan Taxonomy and Detection[C]//Proceedings of IEEE Conference on Design & Test of Computers.Washington D.C.,USA:IEEE Press,2009:10-25.
  • 10Bhunia S,Hsiao M S,Banga M,et al.Hardware Trojan Attacks:Threat Analysis and Countermeasures[J].Proceedings of the IEEE,2014,102(8):1229-1247.

共引文献41

同被引文献66

引证文献15

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部