期刊文献+

基于DCVSL的硬件木马检测

Hardware Trojan Detection Based on DCVSL
下载PDF
导出
摘要 针对硬件木马检测问题,分析了DCVSL(差分串联电压开关逻辑)电路的特性,激活的硬件木马引起DCVSL的输入非互补,电路就会产生一个异常的短路电流.在此基础上提出了基于DCVSL结构的固有特性,利用电路平均短路电流旁路分析的硬件木马检测方法.通过HSIPCE蒙特卡罗分析仿真,以C432标准电路作为测试电路,植入一个微小的硬件木马,仍然检测出了电路中木马的存在,验证了方法的有效性. Aimed at detecting hardware Trojans(HTs),the characteristics of CMOS circuits are analyzed,noncomplementary inputs of DCVSL(Differential Cascade Voltage Switch Logic)caused by the active HT result in abnormal short-circuit current.A hardware Trojan detection method based on inherent feature of DCVSL and average dynamic circuit current is proposed.By HSPICE Mento carlo simulation circuit in which we use a C432 standard circuit with a small hardware Trojan as a test circuit,we detecte the existence of Trojan in the circuit,and verify the validity of the method.
出处 《微电子学与计算机》 CSCD 北大核心 2017年第4期102-105,共4页 Microelectronics & Computer
关键词 硬件木马 旁路分析 差分串联电压开关逻辑 平均短路电流 hardware Trojan side-channel analysis differential cascade voltage switch logic average dynamic circuit
  • 相关文献

参考文献8

二级参考文献91

  • 1King S T, Tucek J, Cozzie A, et al. Designing and im- plementing malicious hardware[C]//Proceedings of the 1 st USENIX Workshop on Large--Scale Exploits and E- mergent Threats (LEET). San Francisco, 2008:1-8.
  • 2Soden J, Anderson R, Henderson C. IC failure analysis tools and techniques- magic, mystery, and science [C]// International Test Conference, Lecture Series II, Practical Aspects of IC Diagnosis and Failure Analysis:A Walk through the Process. Washington, 1996.1-11.
  • 3Wang X, Tehranipoor M, Plusquellic J. Detecting mali- cious inclusions in secure hardware: challenges and solu- tions[C]// 1st IEEE International Workshop on Hard- ware--Oriented Security and Trust (HOST). USA: California, 2008 : 15- 19.
  • 4Alex Clark Baumgarten. Preventing integrated circuit pi- racy using reconfigurable logic barriers[D]. Ames, Io- wa, Iowa State University, 2009.
  • 5Thomas DB. Cyclic expression of blood group determinants in murine cells and their relationship to growth control. Nature, 1971, 233∶317-321.
  • 6Wang Q, Stacy T, Binder M, et al. Disruption of the Cbfa2 gene causes necrosis and hemorrhaging in the central nervous system and blocks definitive hematopoiesis. Proc Natl Acad Sci U S A, 1996, 93∶3444-3449.
  • 7Alwine JC, Kemp DJ, Stark GR. Method for detection of specific RNAs in agarose gels by transfer to diazobenzyloxymethyl-paper and hybridization with DNA probes. Proc Natl Acad Sci U S A, 1977, 74∶5350-5354.
  • 8Veres G, Gibbs RA, Schere SE, et al. The molecular basis of the sparse fur mouse mutation. Science, 1987, 237∶415-417.
  • 9Speck NA, Stacy T, Wang Q, et al. Core-binding factor: a central player in hematopoiesis and leukemia. Cancer Res, 1999,59(Suppl)∶1789-1793.
  • 10Levanon D, Bettoun D, Harris-Cerruti C, et al. The Runx3 transcription factor regulates development and survival of TrkC dorsal root ganglia neurons. EMBO J, 2002, 21∶3454-3463.

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部