期刊文献+

硬件木马电路检测技术及发展趋势 被引量:3

Development tendency in hardware trojan circuit detection
下载PDF
导出
摘要 随着集成电路产业链的全球化,硬件木马电路(HTH)日益成为潜在的威胁.木马电路的隐蔽性、多样性和植入层次的丰富性给木马电路的检测造成了困难.现有HTH检测方法多数通过测量比较功耗、时延等侧信道信息的方式展开,这些方法都需要存在基准设计.通过比较现有不同层次检测方法的特性,提出了HTH检测领域的发展趋势:注重高层次设计的检测、不同检测方法的效果衡量以及容忍工艺误差和测试噪声等干扰因素的更准确检测技术. Hardware trojan horse circuit(HTH) is becoming a potential threat with the globalization of integrated circuit industry and associated supply chains. For its characteristic of concealment, diversity and variety of plant lev- el, it's difficult to find an effective and efficient detection method. In presented HTH detection method the side channel information, such as power rail, timing delay, etc. is measured, with the assumption of obtainable golden circuit. The development tendency in HTH detect field is presented through comparison of different detect method, which includes detect technique development in high-level design, effective comparison platform among different methods and more accurate technique tolerating process variations and measurement noise.
出处 《浙江大学学报(理学版)》 CAS CSCD 2014年第1期49-51,71,共4页 Journal of Zhejiang University(Science Edition)
基金 国家自然科学基金青年项目(61003088) 浙江省自然科学基金青年项目(LQ12F05005)资助 浙江省重点科技创新团队(2011R50019)资助项目
关键词 硬件木马电路 侧信道检测 集成电路设计 hardware trojan circuit side-channel detection IC design
  • 相关文献

参考文献11

  • 1POTLAPALLY N. Hardware security in practice- challenges and opportunities[C]// Proceedings of 2011 IEEE International Workshop on Hardware-Oriented Se- curity and Trust. San Diego: IEEE Computer Society, 2011:93-98.
  • 2AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan detection using IC fingerprinting[C]// Pro- ceedings of 2007 IEEE Syrup Security and Privacy. Oak- land: IEEE Technical Committee on Security and Pri- vacy, 2007 : 296-310.
  • 3WANG X, SALMANI H, TEHRANIPOOR M, et al. Hardware trojan detection and isolation using current integration and localized .current analysis [C]// Pro- ceedings of 2008 IEEE International Symp. Defect and Tolerance of VLSI Systems. Boston: IEEE Computer Soeiety,2008 : 87-95.
  • 4JIN Y, MAKRIS Y. Hardware trojan detection using path delay fingerprint[C]// Proceedings of 2008 IEEE Interna- tional Workshop on Hardware-Oriented Security and Trust. Anaheim: IEEE Computer Society,200S: 51-57.
  • 5RAI D, LACH J. Performance of delay-based Trojan detection techniques under parameter variations[C]// Proceedings of 2009 IEEE Int'l Workshop Hardware-O- riented Security and Trust {HOST 09). San Francisco: IEEE Computer Society,2009:58-65.
  • 6JIN Y, MAKRIS Y. Hardware Trojans in wireless cryptographic ICs[J]. IEEE Design and Test of Com- puters,2010,27(1) : 26-35.
  • 7TEHRANIPOOR M, KOUSHANFAR F. A survey of hardware Trojan taxonomy and detection[J] . Design Test of Computers, IEEE,2010,27(1): 10-25.
  • 8DRZEVITZKY S, KASTENS U, PLATZNER M. Proof-carrying hardware: Towards runtime verification of reconfigurable modules[C]// Proceedings of Interna- tional Conference on Reconfigurable Computing and FP- GAs. Cancun: IEEE Computer Society,2009 : 189-194.
  • 9LOVE E, JIN Y, MAKRIS Y. Enhancing security via provably trustworthy Hardware intellectual property [C]// Proceedings of 2011 IEEE Int'l Workshop Hard- ware-Oriented Security and Trust (HOST 11). San Die- go: IEEE Computer Society,2011 : 12-17.
  • 10LOVE E, JIN Y, MAKRIS Y. Proof-carrying Hard- ware intellectual property: A pathway to trusted rood ule acquisition[J].IEEE Transactions on Information Forensics and Security, 2012,7 ( 1 ) : 25-40.

同被引文献24

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部