期刊文献+

硬件木马防护研究综述 被引量:3

Survey on the Hardware Trojan Protection
下载PDF
导出
摘要 硬件木马具有体积小、易实现、难防护等特点,是目前集成电路面临的主要安全威胁之一,如何保护集成电路不受硬件木马侵袭已日益成为各应用领域迫切需要解决的问题.分析了集成电路面临的3种安全威胁,介绍了硬件木马的概念,讨论了几种比较常见的硬件木马分类方法,在此基础上,从集成电路测试、设计、运行3个方面着重阐述了硬件木马的防护方法,并分析了各自的特点,重点对未来硬件木马检测技术研究进行了展望. Hardware Trojan' s characteristics are small in size, easy to implement, and difficult to protect against, and they are currently one of the major security threats to Integrated Circuits. How to protect Integrated Circuits from the invasion of Hardware Trojan has increasingly become a problem to be solved urgently in various applications. In this paper, we analyze three security threats of Integrated Circuits, introduce the concept of Hardware Trojan, and discuss some of the more common classification of Hardware Trojans. On this basis, we focus on the Hardware Trojan protection methods, and analyze their characteristics from three aspects of Integrated Circuits, namely Test-time, Design-time, and Run-time. Finally, we propose the prospect of the future research about Hardware Trojan Protection.
出处 《军械工程学院学报》 2015年第6期40-50,共11页 Journal of Ordnance Engineering College
基金 国家自然科学基金项目(61271152 51377170) 河北省自然科学基金项目(F2012506008)
关键词 集成电路 硬件木马 旁路分析 安全性设计 integrated circuits hardware Trojan side channel analysis security design
  • 相关文献

参考文献43

  • 1DARPA. Trust in integrated-circuits proposer information pamphlet[EB/OL]. Cleveland: IEEE, 2007 [ 2015-07-25 ]. http://www. Darpa. Mil/MTO/solicitations/baa07-24/ index.html.
  • 2GOERTZEL K, HAMILTON B. Integrated circuit security threats and hardware assurance countermeasures [C]// Proceedings of Cyber Security and Information. New York: ACM, 2013 .. 33-38.
  • 3TEHRANIPOOR M, KOUSHANFAR F. A survey of hardware Trojan taxonomy and detection [J]. IEEE Design Test of Computers, 2010,27 (1) : 10-25.
  • 4KARRI R, RAJENDRAN J, ROSENFELD K. Trojan taxonomy [ C ] //Proceedings of Introduction to Hardware Security and Trust, 2012. New York: Springer, 2012..325-338.
  • 5牛小鹏,李清宝,王炜,张丹.硬件木马技术研究综述[J].信息工程大学学报,2012,13(6):740-748. 被引量:10
  • 6SKOROBOGATOV S, WOODS C. Breakthrough Silicon scanning discovers backdoor in military chip [C] // Proceedings of Cryptographie Hardware and Embedded Systems (CHES12). Berlin Springer, 2012:23-40.
  • 7WOLFF F, PAPACHRISTOU C, BHUNIA S, et al. Towards Trojan free trusted ICs: problem analysis and detection scheme [ C ] //Proceedings of Design, Automation and Test in Europe (DATE08). Munich: IEEE, 2008:1362-1365.
  • 8BANGA M, HSIAO M. A region based approach for the identification of hardware Trojans [C] //Proceedings of Hardware-oriented Security and Trust ( HOST08 ). Anaheim: IEEE, 2008:40-47.
  • 9BANGA M, HSIAO M. A novel sustained vector technique for the detection of hardware Trojans [C] //Proceedings of the 22nd International Conference on VLSI Design. New Delhi: IEEE, 2009:327-332.
  • 10WANG X, TEHRANIPOOR M, PLUSQUELLIC J. Detecting malicious inclusions in secure hardware: challenges and solutions [ C ] //Proceedings of Hardware-oriented Security and Trust (HOST08). Anaheim: IEEE, 2008:15-19.

二级参考文献30

  • 1Lieberman J I. Whitepaper on National Security Aspects of the Global Migration of the U. S. Semiconductor Industry[ EB/OL]. [ 2011-01-08 ]. http ://www. fas. org/congress/2003_cr/s060503, html.
  • 2Baumgaten A, Steffen M, Clausman M, et al. A case study in hardware Trojan design and implementation[ J]. International Journal of Information Security, 2011, 10( 1 ) : 1-14.
  • 3Wang Xiao-Xiao, Tehranipoor M, Plusquellie J. Detecting malicious inclusions in secure hardware challenge and solutions [ C ]//Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust ( HOST' 2008). IEEE Computer Society, 2008: 15-19.
  • 4TehRanipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection[ J]. Journal of IEEE Design & Test of Computers, 2010, 27(1) : 10-25.
  • 5Wolff F, Papachristou C, Bhunia S, et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme[ C]// Proceedings of the conference on Design, Automation and Test in Europe (DATE'2008). 2008: 1362-1365.
  • 6Banga M, Michael S H. A Region Based Approach for the Identification of Hardware Trojans[ C ]//Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust ( HOST' 2008). Washington, DC : IEEE Computer So- ciety, 2008: 40-47.
  • 7Rajendran J, Gavas E, Jimenez J. Towards a comprehensive and systematic classification of hardware Trojans[ C ]//Proceed- ings of 2010 IEEE international Symposium on Circuits and Systems (ISCAS'2010). Paris, France, 2010: 1871-1874.
  • 8Karri R, Rajendran J, Rosenfeld K. Trustworthy hardware: Identifying and classifying hardware Trojans[ J]. Journal of Com- puter, 2010, 43(10): 39-46.
  • 9Bloom G, Narahari B, Simha R. Fab Forensics: Increasing Trust in IC Fabrication[ C ]//Proceedings of the 2010 IEEE Inter- national Conference on Technologies for Homeland Security. 2010: 99-105.
  • 10Jin Y, Kupp N, Makris Y. Experiences in Hardware Trojan design and implementation[ C ]//Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'2009). IEEE Computer Society, 2009: 50-57.

共引文献9

同被引文献11

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部