期刊文献+

一种基于快速激活的硬件木马检测法 被引量:2

A hardware Trojan detection method based on rapid activation
下载PDF
导出
摘要 硬件木马因其巨大的潜在威胁而受到学术界和工业界越来越广泛的关注,而传统的测试技术很难发现这些硬件木马,因此,针对硬件木马的隐藏机制,提出了一种快速激活并检测木马的方法,通过将木马原型植入微处理器OR1200中,并利用大量测试用例激励,激活了木马,验证了该方法的正确性。 Hardware Trojans draw more and more attention of the academia and industry because of its huge potential in recent years. Traditional testing technology is difficult to find these hardware Trojans. To solve this problem, considering the hardware Tro-jan hidden mechanism, a rapid hardware Trojan activation method is proposed in this paper. According to implant several hardware Trojan prototypes into microprocessor OR1200 and take advantage of a large number of test vectors incentives, then using the rapid hardware Trojan activation method, Trojan horses are activated. Thus, the correctness of the method proposed is verified.
出处 《电子技术应用》 北大核心 2016年第8期63-66,共4页 Application of Electronic Technique
基金 国家自然科学基金(61376026)
关键词 硬件木马 翻转概率 木马激活 木马检测 hardware Trojan turning probability Trojan activation Trojan detection
  • 相关文献

参考文献11

  • 1JIN Y,KUPP N,MAKRIS Y.Experiences in hardware Trojan design and implementation[C].Hardware-Oriented Security and Trust.San Francisco:IEEE,2009:50-57.
  • 2AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan de tection using IC fingerprinting[C].Security and Privacy.Berkeley:IEEE,2007:296-310.
  • 3WANG X,SALMANI H,TEHRANIPOOR M,et al.Hardware Trojan detection and isolation using current integration and localized current analysis[C].Defect and Fault Tolerance in VLSI Systems,2008.Boston:IEEE,2008:87-95.
  • 4RAD R M,WANG X,TEHRANIPOOR M,et al.Power supply signal calibration techniques for improving detection resolution to hardware Trojans[C].Proceedings of the 2008IEEE/ACM International Conference on Computer-Aided Design.San Jose:IEEE Press,2008:632-639.
  • 5LI J,LACH J.At-speed delay characterization for IC authentication and Trojan horse detection[C].HardwareOriented Security and Trust.Anaheim:IEEE,2008:8-14.
  • 6JIN Y,MAKRIS Y.Hardware Trojan detection using path delay fingerprint[C].Hardware-Oriented Security and Trust.Anaheim:IEEE,2008:51-57.
  • 7HICKS M,FINNICUM M,KING S T,et al.Overcoming an untrusted computing base:Detecting and removing malicious hardware automatically[C].Security and Privacy.Brisbane:IEEE,2010:159-172.
  • 8STURTON C,HICKS M,WAGNER D,et al.Defeating UCI:Building stealthy and malicious hardware[C].Security and Privacy.Berkeley:IEEE,2011:64-77.
  • 9CHAKRABORTY R S,PAUL S,BHUNIA S.On-demand transparency for improving hardware Trojan detectability[C].Hardware-Oriented Security and Trus.Anaheim:IEEE,2008:48-50.
  • 10TRUST_HUB[EB/OL].[2015-8-12].https://www.trusthub.org/.

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部