期刊文献+

扫描电压对硬件木马检测影响分析

The Analysis of Hardware Trojan Detection based on Scanning Voltage
下载PDF
导出
摘要 硬件木马是一种微小而隐蔽的恶意电路,它隐藏在目标芯片中,在一定条件下实施对目标芯片输入输出节点状态或功能的恶意修改。随着集成电路设计生产全球化的不断加剧,芯片设计与生产环节的分离增加了芯片被植入硬件木马的可能性,给芯片的安全性与可靠性带来了极大的威胁。因此,如何检测被测芯片是否含有硬件木马,确保集成电路芯片安全变得日益重要。文章基于40nm工艺库下,对高级加密标准AES算法的网表中设计植入相对于无木马AES电路大小为2.7%的信息窃取型硬件木马,并与无木马AES电路作为Golden参考模型进行对比,通过分析PVT(工艺、电压、温度)参数中不同工作电压对电路旁路功耗信息影响的规律,发现由工作电压抖动而引起的功耗噪声可以淹没由硬件木马的植入而引入功耗信息,进而降低硬件木马检测效率,在此基础上文章提出一种基于随机扫描电压叠加的硬件木马旁路功耗信息的显化方法,规避了在常规硬件木马检测时电压波动对硬件木马的检测影响,实现对硬件木马的检测。 Hardware Trojan is a malicious circuit which is so tiny and covert, masking in the chip to modify the inputs and outputs’ nodes status or function of the target chip. With the increasing globalization of the design and fabrication of integrated circuits(ICs), it makes the chips easier to be inserted Hardware Trojans due to the separation of the design and production processes, which leads to the huge threat of the ICs’ security and reliability. How to detect whether the test chip containing the Hardware Trojan to ensure safety of the integrated circuits is becoming more and more important. The authors designed a kind of theft-type Hardware Trojan in the netlist of the AES encryption algorithm based on 40-nm standard cell libraries, and the size of the Hardware Trojan was about 2.7% compared with the Golden pure AES circuit (Trojan-free), then the design was analyzed through different operating voltages of the parameter of the PVT (process & voltage & temperature), which caused the different laws of the side-channel power consumption, we have found that the verification of the side-channel power consumption caused by the implanting Hardware Trojan could be overwhelmed by the working voltage jitter, so that reduced the Hardware Trojan detection efficiency. Based on the article, we present a method to manifest the side-channel power consumption of the Hardware Trojan based on the random scanning voltage, which circumvent the effects of the verification of side-channel power consumption due to the voltage fluctuation in the normal Hardware Trojan detection, and achieve the goal of the Hardware Trojan’s detection.
出处 《信息网络安全》 2014年第7期7-11,共5页 Netinfo Security
基金 "核高基"国家重大专项[2012ZX01027004-003]
关键词 芯片安全 硬件木马 旁路分析 扫描电压 AES chip-security hardware trojan side-channel analysis scanning voltage AES
  • 相关文献

参考文献1

二级参考文献14

  • 1SUI Qiang.Hardware trojan detection based on side channel signal analysis[D].Changsha:National University of Defense Technology,2012.
  • 2AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C]//Proceeding of the 2007 IEEE Symposium Security and Privacy.Oakland:IEEE,2007:296-310.
  • 3WOLFF F,PAPACHRISTOU C,BHUNIA S,et al.Towards trojan-free trusted ICs:problem analysis and detection scheme[C]//In Proceedings Design,Automation and Test in Europe,DATE.Munich,Germany:DBLP,2008:1362-1365.
  • 4CHAKRABORTY R S,NARASIMHAN S,BHUNIA S.Hardware trojan:threats and emerging solutions[C]//Proceedings of High Level Design Validation and Test Workshop (HLDVT' 2010).Cleveland,OH,USA:IEEE,2010:166-171.
  • 5JIN Yier,KUPP N,MAKRIS Y.Experiences in hardware trojan design and implementation[C]//2009 IEEE International Workshop on Hardware Oriented Security and Trust.San Francisco,CA,USA:IEEE,2009:50-57.
  • 6JIN Yier,MAKRIS Y.Hardware Trojan detection using path delay fingerprint[C]//In 2008 IEEE International Workshop on Hardware Oriented Security and Trust,HOST.Anaheim,CA,USA:IEEE,2008:51-57.
  • 7LIN Lang,BURLESON W,PAAR C.MOLES:Malicious off-chip leakage enabled by side channels[C]//In IEEE/ACM International Conference on Computer-Aided Design,Digest of Technical Papers,ICCAD.San Jose,CA:IEEE,2009:117-122.
  • 8LIN Lang,KASPER M,GUNEYSU T,et al.Trojan sidechannel:light weight hardware trojans through side-channel Engineering[C]//Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES' 2009).Switzerland:Springer Verlag,2009:382-395.
  • 9LIEBERMAN J I.Whitepaper on national security aspects of the global migration of the U.S.semiconductor industry[EB/OL].(2011-01-08)[2013-09-07].http://www.fas.org/congress/2003_cr/s060503.html.
  • 10CHAKRABORTY R S,WOLFF F,PAUL S,et al.MERO:a statistical approach for hardware Trojan detection[C]//In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).Lausanne,Switzerland:Springer Berlin Heidelberg,2009:396-410.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部