期刊文献+

新情况下的特殊武器——硬件木马 被引量:2

Special Weapons in New Situation—Hardware Trojans
下载PDF
导出
摘要 现今的集成电路,在设计中就有可能植入恶意电路,这种恶意电路被称为硬件木马,硬件木马会影响系统的功能或将关键信息传输给对手。过去几年里这个问题已经获得了巨大关注。依据危害结果对硬件木马进行了分类,分为功能破坏型、性能劣化型、数据窃取型、后门预留型。作者介绍硬件木马的植入途径及其防范方法,硬件木马的危害;还介绍并分析了硬件木马检测的现状,并给出可行方法的建议。 In today's Integrated Circuits design and fabrication process,the possibility of malicious circuit insertion have raised in a design.Such malicious circuits are entitled as Hardware Trojans.Hardware Trojans would impact the functionality or transmit key information to the adversary.This problem has gained significant attention over the past few years.In this article the author classify Hardware Trojans by hazards results: the function destruction type,the performance deterioration type,the data theft type,the back door reserved type.The author introduce that the ways of Hardware Trojans insertion and the guard methods,the hazards of Hardware Trojans.The author introduce and analyze the current situation of Hardware Trojans detection,and give the recommendations of possible ways.
作者 任立儒
出处 《中国电子科学研究院学报》 2011年第2期140-142,共3页 Journal of China Academy of Electronics and Information Technology
关键词 集成电路 恶意电路 植入 硬件木马检测 integrated circuits malicious circuit insertion hardware trojans detection
  • 相关文献

参考文献7

  • 1LIEBERMAN J. Whitepaper on National Security Aspects of the Global Migration of the US Semiconductor Industry [ EB/ OL]. (2003-05-05) [2011-01-08]. http://www, fas. org/irp/ congress/2003 cr/s060503, html.
  • 2ADEE S. The Hunt for the Kill Switch[J].IEEE Spectrum, 2008,45(5) :34-39.
  • 3SHIYANOVSKII Y, FRANCIS G WOLFF, CHRISTOS A Papachristou,et al. Hardware Trojan by Hot Carrier Injection [EB/OL]. (2009-06-20) [2011-01-11] http://arxiv, org/PS _cache/arxiv/pdf/0906/0906.3832vl. pdf.
  • 4WANG X, SALMANI H, TEHRANIPOOR M, et al. Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis [ C ]//Proc. International Symposium on Fault and Defect Tolerance in VLSI Systems( DFF), Cambridge, USA,2008:87-95.
  • 5LI J, LACH J. At-speed Delay Characterization for IC Authentication and Trojan Horse Detection [ C ]//IEEE Intl. Workshop on Hardware-Oriented Security and Trust ( HOST08 ) , Anaheim, CA, USA,2008:8-14.
  • 6JIN Y, MAKRIS Y. Hardware Trojan Detection Using Path Delay Fingerprint[ C ]//IEEE Int. Hardware-Oriented Security and Trust (HOST) ,Anaheim,CA,USA,2008:51-57.
  • 7BANGA M, HSIAO M. Novel Sustained Vector Technique for the Detection of Hardware Trojans [ C ]//Proc. 22nd International Conference on VLSI Design, New Delhi ,India, 2009 : 327 -332.

同被引文献16

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2Jacob N,Merli D,Heyszl J,et al.Hardware Trojans:current challenges and approaches[J].IET Computers&Digital Techniques,2014,8(6):264-273.
  • 3Tehranipoor M,Koushanfar F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design&Test of Computers,2010,27(1):10-25.
  • 4Bhunia S,Hsiao M S,Banga M,et al.Hardware trojan attacks:threat analysis and countermeasures[J].Proceedings of the IEEE,2014,102(8):1229-1247.
  • 5Kubat M.Neural networks:a comprehensive foundation by Simon Haykin,Macmillan[J].The Knowledge Engineering Review,1999,13(4):409-412.
  • 6Rad R,Plusquellic J,Tehranipoor M.Sensitivity analysis to hardware Trojans using power supply transient signals[C]∥Proc of Hardware-Oriented Security and Trust(HOST).Anaheim:IEEE Press,2008:3-7.
  • 7Reece T,Robinson W H.Analysis of data-leak hardware Trojans in AES cryptographic circuits[C]∥Proc of Technologies for Homeland Security(HST).New York:IEEE Press,2013:467-472.
  • 8刘华锋,罗宏伟,王力纬.硬件木马综述[J].微电子学,2011,41(5):709-713. 被引量:14
  • 9王晨旭,姜佩贺,喻明艳.芯片级木马检测技术研究综述[J].半导体技术,2012,37(5):341-346. 被引量:4
  • 10王力纬,罗宏伟,姚若河.基于旁路分析的硬件木马检测方法[J].华南理工大学学报(自然科学版),2012,40(6):6-10. 被引量:8

引证文献2

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部