期刊文献+

一种基于核最大间距准则的硬件木马检测新方法 被引量:7

A New Hardware Trojan Detection Method Based on Kernel Maximum Margin Criterion
下载PDF
导出
摘要 在功耗旁路信号统计模型的基础上,提出了一种基于核最大间距准则的硬件木马检测方法及改进的检测方法.将原始功耗旁路信号映射到高维空间,使其具有更高的可分性,然后再投影到低维子空间,从而发现原始数据中的非线性差异特征,实现功耗旁路信号的非线性特征提取与识别.针对AES加密电路中木马电路的检测实验表明,该方法测得超出检测边界的样本数(792)多于Karhunen-Loève变换(400),取得更好的检测效果. A hardware Trojan detection method based on kernel maximum margin criterion and an improved detection method are proposed on basis of the statistical model of power side-channel signal. The methods can map the rawpower side-channel signal into a higher dimensional space,where it had a higher separability,and then it is projected onto a low-dimensional subspace,so that non-linear characteristics of differences in the rawdata are found,and nonlinear characteristics extraction and recognition of power side-channel signal are achieved. The detection experiment against the Trojan circuit in AES encryption circuit shows that,the number of samples beyond the detection boundary by the method( 792) is more than Karhunen-Loève Transform( 400),which gets a better detection result.
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第3期656-661,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.61271152 No.51377170)
关键词 集成电路 硬件木马 旁路分析 核函数 最大间距准则 integrated circuit hardware Trojan side channel analysis kernel method maximum margin criterion
  • 相关文献

参考文献2

二级参考文献24

  • 1DARPA. Trust in integrated circuits-proposer information pamphlet [ EB/OL ]. ( 2007- 07- 24 ) [ 2011- 08-11 ]. http : //www. darpa, mil/MTO/solicitations/baa07-24/index. html.
  • 2Defense Science Board. High performance microchip sup- ply [ EB/OL]. ( 2005- 02- 21 ) [ 2011- 08- 11 ]. http :// www. acq. osd. mil/dsb/reports/2005-02-HPMS_Report_ Final. pdf.
  • 3Adee S. The hunt for the kill switch [ J ]. IEEE Spectrum, 2008,45 (5) :34-39.
  • 4Wang X, Tehranipoor M, Plusquellic J. Detecting mali- cious inclusions in secure hardware:challenges and solu- tions [ C ]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim:IEEE, 2008 : 15-19.
  • 5Tehranipoor M, Koushanfar F. A survey of hardware Tro- jan taxonomy and detection [ J ]. IEEE Design and Test of Computers ,2010,2( 1 ) : 10-25.
  • 6Chakraborty R, Narasimhan S, Bhunia S. Hardware Tro- jan : threats and emerging solutions [ C ]//Proceedings of IEEE Intenaational High Level Design Validation and Test Workshop. San Francisco : IEEE ,2009 : 166-171.
  • 7Jin Y, Kupp N, Makris Y. Experiences in hardware Trojan design and implementation [ C ] //Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust. Francisco : IEEE ,2009:50-57.
  • 8Agrawal D. Trojan detection using IC fingerprinting [ C]// Proceedings of IEEE Symposium on Security and Privacy. Berkeley : IEEE,2007 : 296- 310.
  • 9Wang Xiaoxiao, Salmani H, Tehranipoor M, et al. Hard- ware Trojan detection and isolation using current integra- tion and localized current analysis [ C ]//Proceedings of IEEE International Symposium on Defect and Fault Tole- rance of VLSI Systems. Boston : IEEE,2008:87-95.
  • 10Rad R M, Wang Xiaoxiao, Tehranipoor M, et al. Power supply signal calibration techniques for improving detec- tion resolution to hardware Trojans [ C ] //Proceedings of IEEE/ACM International Conference on Computer-Aided Design. San Jose : IEEE, 2008 : 632- 639.

共引文献16

同被引文献26

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部