期刊文献+

A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1

A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
下载PDF
导出
摘要 Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.
出处 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页 中国通信(英文版)
基金 supported by the Special Funds for Basic Scientific Research Business Expenses of Central Universities No. 2014GCYY0 the Beijing Natural Science Foundation No. 4163076 the Fundamental Research Funds for the Central Universities No. 328201801
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
  • 相关文献

参考文献10

二级参考文献108

  • 1徐钢,袁星,杨勇平,陆诗原,黄圣伟,张锴.火电机组烟气脱硫系统的节能优化运行[J].中国电机工程学报,2012,32(32):22-29. 被引量:38
  • 2曾声奎,Michael G.Pecht,吴际.故障预测与健康管理(PHM)技术的现状与发展[J].航空学报,2005,26(5):626-632. 被引量:284
  • 3常玉清,王福利,王小刚,吕哲.基于支持向量机的软测量方法及其在生化过程中的应用[J].仪器仪表学报,2006,27(3):241-244. 被引量:28
  • 4杜谦,马春元,董勇,吴少华.循环浆液pH值对湿法烟气脱硫过程的影响[J].热能动力工程,2006,21(5):491-495. 被引量:35
  • 5Lin L, Burleson W, Paar C. MOLES: molicious off-chip leakage en- abled by side-channels. Proceedings of the 2009 International Confer- ence on Computer-aided Design. New York: ACM, 2009:117--122.
  • 6Abramovici M, Bradley P. Integrated circuit security-new threats and solutions. Cyber Security and Information Infrastructure ResearchWorkshop ( CSIIRW'09 ), 2009.
  • 7Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojan detection. IEEE Transactions on Information Forensics and Security, 2011 ,6 ( 1 ) : 162--174.
  • 8King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware. Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008:1--8.
  • 9Banga M, Hsiao M. Novel sustained vector technique for the detection of hardware trojans. Proceedings of 22nd International Conference on VLSI design, 2009 : 327--332.
  • 10Lamech C, Rad R, Tehranipoor M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting trojans and methods for achieving the requied detection sensitivities. IEEE Transactions on Information Forensics and Security, 2011, 6 (3): 142--155.

共引文献82

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部