期刊文献+

基于有限状态机的硬件木马设计和插入(英文) 被引量:1

Design and Insertion of Hardware Trojan Based on Finite State Machine
下载PDF
导出
摘要 针对集成电路设计和制造中存在的硬件木马问题,提出一种新的模型来提高木马检测能力。该模型基于有限状态机,比组合电路型木马难于触发和检测。同时,木马电路插入位置的选择也可以有效规避路径延时检测方法。实验选择ISCAS’89基准电路中的S349作为目标电路,对功能和延时信息进行仿真。实验结果表明,这种类型的木马难于激活,并且选择合适的插入位置可以有效隐藏延时信息。 According to the hardware Trojans inserted during design and fabrication, the authors provide a new model of Trojan. New model is based on a finite state machine which is more difficult to trigger and detect than those based on combinational circuits. Also, the locations in target circuits to insert Trojans are considered to avoid being detected using path delay fingerprint method. $349 circuit from ISCAS'89 benchmark circuits is chosen as the target circuit. Functional simulations are performed and delay information is simulated. The results show that this type of hardware Trojan is difficult to activate and the insertion method is effective to hide delay information.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第6期1105-1110,共6页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家自然科学基金(61176039)资助
关键词 硬件木马 木马插入 硬件安全 路径延时检测 hardware Trojan Trojan insertion hardware security path delay detection
  • 相关文献

参考文献11

  • 1Defense Science Board. Report of the defense scienceboard task force on high performance microchipsupply[R].Washington, 2005.
  • 2Lieberman J. Whitepaper on national security aspectsof the global migration of the U.S. semiconductorindustry. Washington, 2003.
  • 3Adee S. The hunt for the kill switch. IEEE Spectrum,2008,45(5): 34-39.
  • 4Chakraborty R S, Narasimhan S, Bhunia S. Hardwareof IEEE Int’l Workshop Hardware-Oriented Securityand Trust. San Francisco: IEEE, 2009: 166-171.
  • 5Tehranipoor M, Koushanfar F. A survey of hardwaretrojan taxonomy and detection. IEEE Design and Testof Computers, 2010,27(1):10-25.
  • 6Wang Xiaoxiao, Tehranipoor M, Plusquellic J.Detecting malicious inclusions in secure hardware:challenges and solutions // Proceedings of IEEE Int’lWorkshop Hardware-Oriented Security and Trust.Anaheim: IEEE, 2008: 15-19.
  • 7Salmani H, Tehranipoor M, Plusquellic J. New designstrategy for improving hardware trojan detection andreducing trojan activation time // Proceedings of IEEEInt’l Workshop Hardware-Oriented Security andTrust. San Francisco: IEEE,2009: 66-73.
  • 8Jin Y, Makris Y. Hardware trojan detection using pathdelay fingerprint // Proceedings of IEEE Int’lWorkshop Hardware-Oriented Security and Trust.Anaheim: IEEE, 2008: 51-57.
  • 9Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting// IEEE Symposium on Security and Privacy. California: IEEE, 2007: 296-310.
  • 10King S T, TUcek J, Cozzie A, et al. Designing andimplementing malicious hardware // First USENIXWorkshop on Large-Scale Exploits and EmergentThreats (LEET). San Francisco, 2008: 45-51.

同被引文献8

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部