期刊文献+

FPGA密码模块恶意木马后门设计 被引量:1

Design of vicious trojan backdoor for FPGA cryptographical module
下载PDF
导出
摘要 FPGA器件安全性包括数据安全性和应用程序安全性两部分。FPGA生命周期的各个阶段对其安全性都会产生至关重要的影响,由于FPGA电路在设计和生产中的脆弱性,使得恶意木马电路能够有机可乘。针对FPGA器件开发阶段,以FPGA密码模块为目标,设计能够泄露密钥的恶意木马后门电路,对于了解硬件木马实现机理、警示FPGA芯片安全具有重要作用。 Security of FPGA contains two parts of data and program. Each phases in the life cycle of FPGA can bring significant influence for its security. The vulnerabilities in today's design and fabrication process have raised the possibility of malicious circuit modification as known as trojans in a design to impact the functionality or transmit key information to the adver- sary. This paper designs a hardware trojan of transmitting key information towards FPGA. It is importantation to realize the imple- ment mechanism and raise the attention to IC security.
出处 《微型机与应用》 2013年第22期20-22,共3页 Microcomputer & Its Applications
关键词 恶意木马 FPGA安全 硬件后门 密码模块 vicious trojan FPGA security hardware backdoor cryptographical module
  • 相关文献

参考文献6

  • 1TEHRANIPOOR M, KOUSHANFAR F. A survey of hard-ware trojan taxonomy and detection[J]. IEEE Design and Test of Computers, 2010,27 ( 1 ): 10- 25.
  • 2BHAMIDIPATI H. Single trojan injection model generation and detection[D].Cleveland: Case Western Reserve Univer- sity, 2009.
  • 3POTKONJAK M, KARRI R. Special issue on integrated circuit and system security[J]. IEEE Transactions on Signal Processing, 2010,58 ( 11 ) : 5968.
  • 4FELLER T, DEMIREZEN A. Hardware trojans: data leak- age using general purpose LEDs[Z].Technical Report-TUD- CS-2010-2384,2010.
  • 5张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 6胡桂廷,陈向东.基于LabVIEW RT的自动测试系统的研究与实现[J].微型机与应用,2012,31(18):5-7. 被引量:4

二级参考文献24

  • 1欧阳三泰,周琴,谭梅.基于LabVIEW平台和GPIB接口的在线测控系统[J].湖南工程学院学报(自然科学版),2006,16(2):4-6. 被引量:3
  • 2Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]//1st IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscataway:IEEE Press, 2008: 15-19.
  • 3U S D of Defense. Defense science board task force on high performance microchip supply[DB/CD][2010-01-10]. http://www. acq. osd. mil/dsb/reports/2005-02 HPMS Report Final. pdf.
  • 4Adee S. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 5King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware [C]// Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008: 1-8.
  • 6Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]// Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2007: 296- 310.
  • 7Lin L, Burleson W, Paar C. MOLES: Malicious offchip leakage enabled by side-channels [C]//Proceed ings of the 2009 International Conference on Computer-aided Design. New York: ACM, 2009: 117-122.
  • 8Banga M, Hsiao M S. A region based approach for the identification of hardware trojans[C]//IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 40-47.
  • 9Chakraborty R, Paul S, Bhunia S. On-demand transparency for improving hardware trojan detectability [C]//IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscat-away:IEEE Press, 2008: 48-50.
  • 10Rad R M, Wang X, Tehranipoor M, et al. Power supply signal calibration techniques for improving detection resolution to hardware troians[C]// Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design. Piscataway: IEEE Press, 2008: 632-639.

共引文献19

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部