期刊文献+

基于自比较方法的硬件木马检测技术 被引量:2

Hardware Trojan Detection Technology Based on the Self-Referencing Approach
下载PDF
导出
摘要 硬件木马成为近年来硬件安全领域的一个新威胁。硬件木马可能在集成电路设计的各个阶段插入到电路中,一经流片,就不可修复更改,将对通信和安全等领域造成巨大损失。针对时序型硬件木马,提出一种不需要基准芯片的自比较硬件木马检测技术。即通过对电路添加相同重复的激励,比较对应激励在不同时间窗口的电流值,判断电路中是否含有木马。将高级加密标准(AES)加密电路在SMIC 0.18μm,0.13μm,65 nm,55 nm四种工艺库条件下进行仿真,并结合马氏距离处理实验数据,增加检测的区分度。仿真数据区分度提高了240.6倍,现场可编程门阵列(FPGA)实测数据增加了3.5倍。实验结果表明,基于自比较的硬件木马检测技术能够检测出比AES电路小2个数量级的硬件木马。 Hardware trojan has become a new threat in the hardware security field in recent years.It can be inserted into the circuits in different stages of the integrated circuit design,and can' t be restored after manufactured,which causes great damage to communication and security. Aiming at the sequential hardware trojan,a self-referencing method without the reference chip for detecting hardware trojans was proposed. By adding the same repetitive signals to the circuit,the current values of the corresponding signals at different time were compared to judge whether the circuit contains trojans. The advanced encryption standard( AES) circuit was simulated under four process conditions of 0. 18 μm,0. 13 μm,65 nm and 55 nm of surface mount integrated circuit( SMIC). And the experimental data were analyzed with Mahalanobis distance to increase the discrimination of detection. The discrimination of simulation data was increased by 240. 6 times,and the experiment data of the field-programmable gate array( FPGA) were increased by 3. 5 times. The results show that the hardware trojans which are 2 orders of magnitude smaller than the AES circuit can be detected with the hardware trojan detection technology based on the self-referencing approach.
作者 王乔 于宗光 周昱 王林 雷淑岚 Wang Qiao Yu Zongguang Zhou Yu Wang Lin Lei Shulan(School of loT Engineering, Jiangnan Univerisity, Wuxi 214122, China The 58^th Research Institute, CETC, Wuxi 214035, China)
出处 《半导体技术》 CAS CSCD 北大核心 2016年第10期789-793,799,共6页 Semiconductor Technology
关键词 硬件木马 自比较 高级AES 马氏距离 检测技术 现场可编程门阵列(FPGA) hardware Trojan self-referencing AES Mahalanobis distance detection technology field programmable gate array(FPGA)
  • 相关文献

参考文献2

二级参考文献40

  • 1DARPA. Trust in integrated circuits - proposer information pamphlet [EB/OL]. http://www, darpa. mil/M TO/solicitations/baaOT-24/index. html, 2007.
  • 2Defense Science Board. High performance microchip supply [EB/OL]. http://www, acq. osd. mil/dsb/ reports/20 05-02-HPMS Report_Final. pdf, 2005.
  • 3ADEE S. The hunt for the kill switch [J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 4JIN Y, KUPP N, MAKRIS Y. Experiences in hardware trojan design and implementation [C] // Workshop Hardware-Oriented Security & Trust. San Diego, CA, USA. 2009 : 50-57.
  • 5AGRAWAL D. Trojan detection using IC fingerprinting [C] //Syrup Security & Privacy. San Diego, CA, USA. 2007: 296-310.
  • 6WANG X. Hardware Trojan detection and isolation using current integration and localized current analysis [C] // Syrup Defect & Fault Tolerance VLSI Syst. Grenoble, France. 2008: 87-95.
  • 7RAD R. Power supply signal calibration techniques for improving detection resolution to hardware Trojans [C] //Conf Computer-Aided Des. Santa Clara, CA, DSA. 2008: 632-639.
  • 8LI J, LACH J. At-speed delay characterization for IC authentication and Trojan horse detection [C] // Workshop Hardware-Oriented Security & Trust. Monterey, CA, USA. 2008: 8-14.
  • 9JIN Y, MAKRIS Y. Hardware Trojan detection using path delay fingerprint [C] // Workshop Hardware- Oriented Security & Trust. Monterey, CA, USA. 2008: 51-57.
  • 10TAGUCHI G, JUGULUM R. The Mahalanobis - Taguchi strategy: a pattern technology system [M]. New York: Wiley, 2002.

共引文献20

同被引文献1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部