期刊文献+

基于K_L变换与SVM的硬件木马检测新方法 被引量:1

A New Hardware Trojan Detection Method Based on K_L Transform and SVM
下载PDF
导出
摘要 针对基于旁路分析的硬件木马检测,旁路信号数据在空间中呈现高维分布、非线性的问题,探究在降低信号维数方面核函数的可行性,提出了一种基于K_L变换与支持向量机(Support Vector Machine,SVM)的硬件木马检测模型。在FPGA加密芯片中植入所设计的硬件木马进行实验,实验结果对比表明,利用主特征向量构建的SVM模型在检测占电路2%的硬件木马时,测试准确率达到了98.1%,为规模更小的木马检测提供了新思路。 Aiming at the problem that side-channel signal data appears non -linear and high- dimensional distribution in hardware Trojan detection. For detecting the feasibility of reducing the dimension of the signal by kernel function, hardware Trojan detection mode based on K_L transform and SVM is proposed. Finally, the hardware Trojan is implanted in the FPGA encryption chip. The experimental results show that the SVM with radial basis function has accuracy of 98.1 % in detecting the hardware Trojan occupying 2 % of the circuit, provides a new idea for the detection of smaller hardware Trojans.
作者 魏延海 李雄伟 张阳 王晓晗 郭东昕 WEI Yan-hai;LI Xiong-wei;ZHANG Yang;WANG Xiao-han;GUO Dong-xin(Shijiazhuang Campus of Army Engineering University,Shijiazhuang 050003,China)
出处 《火力与指挥控制》 CSCD 北大核心 2019年第10期38-42,共5页 Fire Control & Command Control
基金 国家自然科学基金(61271152,51377170) 国家青年科学基金(61602505) 河北省自然科学基金资助项目(F2012506008)
关键词 旁路分析 硬件木马检测 K_L 变换 SVM side-channel analysis hardware trojan detection K_L transform SVM
  • 相关文献

参考文献5

二级参考文献35

  • 1DARPA. Trust in integrated circuits-proposer information pamphlet [ EB/OL ]. ( 2007- 07- 24 ) [ 2011- 08-11 ]. http : //www. darpa, mil/MTO/solicitations/baa07-24/index. html.
  • 2Defense Science Board. High performance microchip sup- ply [ EB/OL]. ( 2005- 02- 21 ) [ 2011- 08- 11 ]. http :// www. acq. osd. mil/dsb/reports/2005-02-HPMS_Report_ Final. pdf.
  • 3Adee S. The hunt for the kill switch [ J ]. IEEE Spectrum, 2008,45 (5) :34-39.
  • 4Wang X, Tehranipoor M, Plusquellic J. Detecting mali- cious inclusions in secure hardware:challenges and solu- tions [ C ]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim:IEEE, 2008 : 15-19.
  • 5Tehranipoor M, Koushanfar F. A survey of hardware Tro- jan taxonomy and detection [ J ]. IEEE Design and Test of Computers ,2010,2( 1 ) : 10-25.
  • 6Chakraborty R, Narasimhan S, Bhunia S. Hardware Tro- jan : threats and emerging solutions [ C ]//Proceedings of IEEE Intenaational High Level Design Validation and Test Workshop. San Francisco : IEEE ,2009 : 166-171.
  • 7Jin Y, Kupp N, Makris Y. Experiences in hardware Trojan design and implementation [ C ] //Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Francisco : IEEE ,2009:50-57.
  • 8Agrawal D. Trojan detection using IC fingerprinting [ C]// Proceedings of IEEE Symposium on Security and Privacy. Berkeley : IEEE,2007 : 296- 310.
  • 9Wang Xiaoxiao, Salmani H, Tehranipoor M, et al. Hard- ware Trojan detection and isolation using current integra- tion and localized current analysis [ C ]//Proceedings of IEEE International Symposium on Defect and Fault Tole- rance of VLSI Systems. Boston : IEEE,2008:87-95.
  • 10Rad R M, Wang Xiaoxiao, Tehranipoor M, et al. Power supply signal calibration techniques for improving detec- tion resolution to hardware Trojans [ C ] //Proceedings of IEEE/ACM International Conference on Computer-Aided Design. San Jose : IEEE, 2008 : 632- 639.

共引文献25

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部