期刊文献+

硬件木马综述 被引量:14

Survey on Hardware Trojan Horse
下载PDF
导出
摘要 集成电路在设计或制造过程中会受到硬件木马的攻击,使芯片与硬件的安全性受到威胁。硬件木马技术逐渐受到重视,已成为当今一个新的研究热点。文章介绍了硬件木马的概念,对三种主要的硬件木马分类方法进行了分析;着重探讨了硬件木马的检测方法。对检测方法存在的问题与面临的挑战进行了分析,指出基于旁路信号分析的硬件木马检测方法是当前最主要的一种检测方法。 Integrated circuits are vulnerable to hardware Trojan horse either in design or during fabrication,which threatens security of chips and hardware.The hardware Trojan horse technology has raised serious concerns and become a new research focus.The concept of hardware Trojan horse was described,and three main classifications of hardware Trojan horses were analyzed.The state-of-the-art of hardware Trojan horse detection techniques were reviewed,and problems with detection methods and major challenges to be addressed in future researches were discussed.It has been pointed out that side channel signal analysis is the most important hardware Trojan horse detection method.
出处 《微电子学》 CAS CSCD 北大核心 2011年第5期709-713,共5页 Microelectronics
关键词 硬件木马 集成电路 芯片安全 检测方法 Hardware Trojan horse Integrated circuit Chip security Detection method
  • 相关文献

参考文献22

  • 1Alwine JC, Kemp DJ, Stark GR. Method for detection of specific RNAs in agarose gels by transfer to diazobenzyloxymethyl-paper and hybridization with DNA probes. Proc Natl Acad Sci U S A, 1977, 74∶5350-5354.
  • 2Veres G, Gibbs RA, Schere SE, et al. The molecular basis of the sparse fur mouse mutation. Science, 1987, 237∶415-417.
  • 3Thomas DB. Cyclic expression of blood group determinants in murine cells and their relationship to growth control. Nature, 1971, 233∶317-321.
  • 4Wang Q, Stacy T, Binder M, et al. Disruption of the Cbfa2 gene causes necrosis and hemorrhaging in the central nervous system and blocks definitive hematopoiesis. Proc Natl Acad Sci U S A, 1996, 93∶3444-3449.
  • 5Speck NA, Stacy T, Wang Q, et al. Core-binding factor: a central player in hematopoiesis and leukemia. Cancer Res, 1999,59(Suppl)∶1789-1793.
  • 6Levanon D, Bettoun D, Harris-Cerruti C, et al. The Runx3 transcription factor regulates development and survival of TrkC dorsal root ganglia neurons. EMBO J, 2002, 21∶3454-3463.
  • 7Inoue K, Ozaki S, Shiga T, et al. Runx3 controls the axonal projection of proprioceptive dorsal root ganglion neurons. Nat Neurosci, 2002, 5∶946-954.
  • 8Look AT. Oncogenic transcription factors in the human acute leukemias. Science, 1997, 278∶1059-1064.
  • 9Li QL, Ito K, Sakakura C, et al. Causal relationship between the loss of RUNX3 expression and gastric cancer. Cell, 2002, 109∶113-124.
  • 10Levanon D, Brenner O, Negreanu V, et al. Spatial and temporal expression pattern of Runx3 (Aml2) and Runx1 (Aml1) indicates non-redundant functions during mouse embryogenesis. Mech Dev, 2001, 109∶413-417.

共引文献1

同被引文献69

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2朱惠倩.聚类分析的一种改进方法[J].湖南文理学院学报(自然科学版),2005,17(3):7-9. 被引量:15
  • 3SUI Qiang.Hardware trojan detection based on side channel signal analysis[D].Changsha:National University of Defense Technology,2012.
  • 4AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C]//Proceeding of the 2007 IEEE Symposium Security and Privacy.Oakland:IEEE,2007:296-310.
  • 5WOLFF F,PAPACHRISTOU C,BHUNIA S,et al.Towards trojan-free trusted ICs:problem analysis and detection scheme[C]//In Proceedings Design,Automation and Test in Europe,DATE.Munich,Germany:DBLP,2008:1362-1365.
  • 6CHAKRABORTY R S,NARASIMHAN S,BHUNIA S.Hardware trojan:threats and emerging solutions[C]//Proceedings of High Level Design Validation and Test Workshop (HLDVT' 2010).Cleveland,OH,USA:IEEE,2010:166-171.
  • 7JIN Yier,KUPP N,MAKRIS Y.Experiences in hardware trojan design and implementation[C]//2009 IEEE International Workshop on Hardware Oriented Security and Trust.San Francisco,CA,USA:IEEE,2009:50-57.
  • 8JIN Yier,MAKRIS Y.Hardware Trojan detection using path delay fingerprint[C]//In 2008 IEEE International Workshop on Hardware Oriented Security and Trust,HOST.Anaheim,CA,USA:IEEE,2008:51-57.
  • 9LIN Lang,BURLESON W,PAAR C.MOLES:Malicious off-chip leakage enabled by side channels[C]//In IEEE/ACM International Conference on Computer-Aided Design,Digest of Technical Papers,ICCAD.San Jose,CA:IEEE,2009:117-122.
  • 10LIN Lang,KASPER M,GUNEYSU T,et al.Trojan sidechannel:light weight hardware trojans through side-channel Engineering[C]//Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES' 2009).Switzerland:Springer Verlag,2009:382-395.

引证文献14

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部