期刊文献+

基于遗传算法的硬件木马检测方法 被引量:2

A Novel Hardware Trojan Detection Method Based on Genetic Algorithm
下载PDF
导出
摘要 针对硬件木马严重威胁到芯片的安全性和系统的可靠性的问题,提出了一种基于遗传算法的集成电路硬件木马检测方法,该方法将K均值算法的局部收敛能力和遗传算法的全局收敛能力结合起来,提取旁路信息间的微小特征差异,实现硬件木马的在线自动检测.本实验在FPGA芯片实现硬件验证,以全局时钟、动态功耗和环形振荡器的输出三个信号作为研究对象,搭建集成电路硬件木马检测系统采集三维旁路信息,对160个样本芯片数据进行聚类分析,实验结果证明该方法可准确有效地检测出硬件木马,检测分辨率达到10-4量级. Hardware Trojan, a malicious circuit inserted into the golden circuit, causes a serious risk to the security of Integrated Circuits and the trust of critical system. Thus, hardware Trojan detection is of great significance. A novel hardware Trojan detection method based on clustering analysis algorithm is presented in this work, which employs the global optimized ability of genetic algorithm and the local searching capability of K-means algorithm to automatically fulfill the detection online. Side-channel signals, such as global clock signal, reset signal and a ring oscillator signal of a chip, are applied as the inputs of the clustering algorithm, since they may be altered by the Trojan circuit. Experimental results implemented with FPGAs demonstrate that the tested chips can be clustered into two categories, and the Trojan chips can be distinguished from the Golden chips accurately. The detection resolution achieves about 10.4 , which indicates the proposed novel detection method is feasible and effective.
出处 《微电子学与计算机》 CSCD 北大核心 2016年第11期74-77,共4页 Microelectronics & Computer
关键词 硬件木马 遗传算法 特征提取 旁路分析 hardware trojan genetic algorithm characteristics extraction side-channel analysis
  • 相关文献

参考文献7

  • 1Bhunia S, Hsiao M S, Bavga M, et ak Hardware Trojan Attacks: Threat Analysis and Countermeasures[J]. Pro- ceedings of the IEEE, 2014,10(8):1229-1247.
  • 2Xiao K, Forte D, Tehranipoor M. A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans[J]. IEEE Transactions on comput- er-aided design of integrated circuits and systems, 2014,33(12) :1778-1791.
  • 3苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 4Shila D M, Venugopal V. Design, implementation and security analysis of Hardware Trojan Threats in FP- GA[C]//Proc of IEEE Communication and Informa- tion Systems Security Symposium. New York, NY, USA: ACM, 2014. 247-24.
  • 5Holland J H. Adaptation in natural and artificial sys- tems: an introductory analysis with applications to bi- ology, control, and artificial intelligence[M].2nd ed. Cambridge: MIT Press, 1992.
  • 6张鹏,王新成,周庆.基于电磁辐射信号分析的芯片硬件木马检测[J].电子学报,2014,42(2):341-346. 被引量:11
  • 7Kitsos P, Voyiatzis A G. FPGA trojan detection using length-optimized ring oscillators [C] /// Proc of 17th Euromicro Conference on Digital System Design. Paris kitsos: IEEE, 2014 : 675-678.

二级参考文献14

  • 1Tehranipoor M, Koushanfar F.A survey of hardware trojan tax- onomy and detection[ J]. IEEE Design & Test of Computers, 2010,27(1) : 10- 25.
  • 2Koushanfar F, Mirhoseini A. A unified framework for multi- modal submodular integrated circuits trojan detection[ J]. IF, F.E Transactions on Information and Security, 2011,6( 1 ):162- 174.
  • 3Jill Y, Makris Y. Hardware trojan detection using path delay fingerprint[ A ]. IEEE International Workshop on Hardware- Oriented Security and Trust (HOST) [ C ]. Anaheim: IE EE Computer Society, 2008.51 - 57.
  • 4Agrawal D, Bakfir S, Karakoyunlu D, et al. Trojan detection us- hag IC fingerprintirtg[ A ]. IEEE Symposium on Security and Privacy [ C ]. Berkeley: IEFF. Computer Society, 2007. 296 - 310.
  • 5Banga M,Hsiao M.A region based approach for the identifica- tion of hardware Trojans[ A ]. IEEE International Workshop on Hardware-Oriented Security and Trust(HOST) [ C ]. Anaheim: IEEE Computer Society,2008.40 - 47.
  • 6Wei S, Potkonjak M. Scalable hardware trojan diagnosis[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2012,20(6) : 1049 - 1057.
  • 7Alex C B. Preventing integrated circuit piracy using reconfig- urable logic barriers[ D ]. Ames: Iowa State University, 2009. 78 - 80.
  • 8Zhang P, Deng G M, Zlaao Q. An Automatic Experimental Platform for Differential Electromagnetic Analysis on Crypto- graphic ICs [ A ]. Proceedings of the Second International Symposium on Test Automation & Instrumentation-ISTAI 2008[ C ]. Beijing: World Pubfishing Corporation, 2008. 1078 - 1082.
  • 9陈开颜,张鹏,邓高明,赵强.物理可观测下DES的安全性研究[J].电子学报,2009,37(11):2389-2395. 被引量:7
  • 10蒋玉娇,王晓丹,王文军,毕凯.一种基于PCA和ReliefF的特征选择方法[J].计算机工程与应用,2010,46(26):170-172. 被引量:25

共引文献22

同被引文献6

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部