期刊文献+

硬件木马检测与防护 被引量:15

Hardware Trojans detection and protection
下载PDF
导出
摘要 第三方技术服务的普及使得在集成电路(IC)设计制造过程中,芯片可能被恶意植入"硬件木马",给芯片的安全性带来了极大挑战,由此,如何检测"安全芯片"中是否存在硬件木马,确保芯片的安全性开始受到人们的广泛关注。在简要介绍硬件木马概念及其危害的基础上,分析硬件木马的特点和结构,介绍了当前现有的几种硬件木马检测技术,给出了硬件木马检测技术的科学分类,重点分析了这些检测方法所面临的问题和挑战并提出了相应的改进措施,总结了未来硬件木马防测技术的发展趋势。 With the popularity of third-pariy technical services, chips may be maliciously implsnted hardware Trojans during the IC design and manufacturing process, which brings a major challenge for chip security. So how to detect the existence of hardware Trojans and ensure the security of chips gradually has attracted wide attention. This paper briefly introduces the concept and harm of hardware Trojans. Then we analyse the characteristics and structural features of hardware Trojans, in- troduce currently existing hardware Trojan detection technology, give the classification of hardware Trojan detection technol- ogy, especially the problems and challenges faced by current detection methods, and put forward the corresponding im- provelnent lneasures. At last we stun up the future research trends of hardware Trojan prevention and detection technology.
出处 《数字通信》 2014年第1期59-63,68,共6页 Digital Communications and Networks
基金 "核高基"国家重大专项基金资助项目(2012ZX01 027004-003)
关键词 IC 安全芯片 硬件木马 检测技术 旁路分析 integrated circuit, security chip, hardware Trojans, detection technology, side channel analysis
  • 相关文献

参考文献14

  • 1LIEBERMAN J I.Whitepaper on national security aspects of the global migration of the U.S.semiconductor industry[EB/OL].(2011-01-08)[2013-09-07].http://www.fas.org/congress/2003_cr/s060503.html.
  • 2LIN Lang,BURLESON W,PAAR C.MOLES:Malicious off-chip leakage enabled by side channels[C]//In IEEE/ACM International Conference on Computer-Aided Design,Digest of Technical Papers,ICCAD.San Jose,CA:IEEE,2009:117-122.
  • 3CHAKRABORTY R S,WOLFF F,PAUL S,et al.MERO:a statistical approach for hardware Trojan detection[C]//In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).Lausanne,Switzerland:Springer Berlin Heidelberg,2009:396-410.
  • 4CHAKRABORTY R S,NARASIMHAN S,BHUNIA S.Hardware trojan:threats and emerging solutions[C]//Proceedings of High Level Design Validation and Test Workshop (HLDVT' 2010).Cleveland,OH,USA:IEEE,2010:166-171.
  • 5AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C]//Proceeding of the 2007 IEEE Symposium Security and Privacy.Oakland:IEEE,2007:296-310.
  • 6SALMANI H,TEHRANIPOOR M,PLUSQUELLIC J.A layout-aware approach for improving localized switching to detect hardware trojans in integrated circuits[C]//In 2010 IEEE International Workshop on Information Forensics and Security,WIFS 2010.Seattle,WA,United States:IEEE,2010.
  • 7SUI Qiang.Hardware trojan detection based on side channel signal analysis[D].Changsha:National University of Defense Technology,2012.
  • 8LIN Lang,KASPER M,GUNEYSU T,et al.Trojan sidechannel:light weight hardware trojans through side-channel Engineering[C]//Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES' 2009).Switzerland:Springer Verlag,2009:382-395.
  • 9JIN Yier,MAKRIS Y.Hardware Trojan detection using path delay fingerprint[C]//In 2008 IEEE International Workshop on Hardware Oriented Security and Trust,HOST.Anaheim,CA,USA:IEEE,2008:51-57.
  • 10刘华锋,罗宏伟,王力纬.硬件木马综述[J].微电子学,2011,41(5):709-713. 被引量:14

二级参考文献52

  • 1Thomas DB. Cyclic expression of blood group determinants in murine cells and their relationship to growth control. Nature, 1971, 233∶317-321.
  • 2Wang Q, Stacy T, Binder M, et al. Disruption of the Cbfa2 gene causes necrosis and hemorrhaging in the central nervous system and blocks definitive hematopoiesis. Proc Natl Acad Sci U S A, 1996, 93∶3444-3449.
  • 3Alwine JC, Kemp DJ, Stark GR. Method for detection of specific RNAs in agarose gels by transfer to diazobenzyloxymethyl-paper and hybridization with DNA probes. Proc Natl Acad Sci U S A, 1977, 74∶5350-5354.
  • 4Veres G, Gibbs RA, Schere SE, et al. The molecular basis of the sparse fur mouse mutation. Science, 1987, 237∶415-417.
  • 5Speck NA, Stacy T, Wang Q, et al. Core-binding factor: a central player in hematopoiesis and leukemia. Cancer Res, 1999,59(Suppl)∶1789-1793.
  • 6Levanon D, Bettoun D, Harris-Cerruti C, et al. The Runx3 transcription factor regulates development and survival of TrkC dorsal root ganglia neurons. EMBO J, 2002, 21∶3454-3463.
  • 7Inoue K, Ozaki S, Shiga T, et al. Runx3 controls the axonal projection of proprioceptive dorsal root ganglion neurons. Nat Neurosci, 2002, 5∶946-954.
  • 8Look AT. Oncogenic transcription factors in the human acute leukemias. Science, 1997, 278∶1059-1064.
  • 9Li QL, Ito K, Sakakura C, et al. Causal relationship between the loss of RUNX3 expression and gastric cancer. Cell, 2002, 109∶113-124.
  • 10Levanon D, Brenner O, Negreanu V, et al. Spatial and temporal expression pattern of Runx3 (Aml2) and Runx1 (Aml1) indicates non-redundant functions during mouse embryogenesis. Mech Dev, 2001, 109∶413-417.

共引文献19

同被引文献82

  • 1邢强,骆丽.集成电路设计中IP核的保护措施[J].中国集成电路,2006,15(6):73-75. 被引量:2
  • 2董师师,黄哲学.随机森林理论浅析[J].集成技术,2013,2(1):1-7. 被引量:146
  • 3苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 4许少华,路阳,席海青,孙素艳,李欣.样本先验知识在神经网络训练中的应用[J].大庆石油学院学报,2004,28(6):66-69. 被引量:6
  • 5张华伟,王明文,甘丽新.基于随机森林的文本分类模型研究[J].山东大学学报(理学版),2006,41(3):5-9. 被引量:58
  • 6AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C]//Proceeding of the 2007 IEEE Symposium Security and Privacy.Oakland:CA,USA,2007:296-310.
  • 7LIEB ERMAN J I.Whitepaper on national security aspects of the global migration of the U.S semiconductor industry[EB/OL].(2011-01-08)[2014-03-12].http://www.fas.org/congress/2003_cr/s060503.html.
  • 8NI Lin,LI Shaoqing,CHEN Jihua,et al.The influence on sensitivity of hardware trojans detection by test vector[C]//Proceeding of 2014 communications security conference (CSC2014).Beijing:[s.n.],2014:46-51.
  • 9JIN Y,MAKRIS Y.Hardware trojan detection using path delay fingerprint[C]//In 2008 IEEE International Workshop on Hardware Oriented Security and Trust,HOST.Anaheim,CA,United states,2008:51-57.
  • 10鄢贵海.数字集成电路时序偏差的在线监测和容忍[D].北京:中国科学院研究生院,2012.

引证文献15

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部