期刊文献+

一种基于扫描链的硬件木马检测新方法

The New Study of Hardware Trojan Detection Based on Reference Curve
下载PDF
导出
摘要 本文提出了一种基于动态电流-静态电流(Iddt-Iddq)的检测方法,在电路设计阶段插入扫描链进行分区设计相结合的硬件木马检测技术,选用Can总线控制器电路作为实验电路,在电路设计阶段将电路分区并插入扫描链,然后进行流片,选用源表、专用PCB测试板、Can总线收发器搭建测试平台进行芯片实测,实测结果表明,这种检测方法可以大幅减小工艺漂移的影响并且提高硬件木马检测分辨率. In this paper, we propose a new detecting technology which combines the dynamic current-static current detecting approach in the test phase with inserting the scan-chain in the design phase. Choosing the Can Bus controller circuit as the circuit under test(CUT) , inserting the scan-chain in the design phase and tape it out. Then design specified PCB test board, choose the SourceMeter and Can transceivers to set up the test system. The test result shows that this system can reduce the influence of the process variation on the detecting result efficiently and improve the detection accuracy.
出处 《微电子学与计算机》 CSCD 北大核心 2017年第8期38-41,46,共5页 Microelectronics & Computer
关键词 硬件木马 扫描链 工艺漂移 Can控制器电路 检测分辨率 hardware trojan scan-chain process variation can controller circuit detecting accuracy
  • 相关文献

参考文献2

二级参考文献32

  • 1DEFENSE SIENCE BOARD. Report of the Defense Science Board Task Force on High Performance Microchip Supply [R]. Washington DC: Defense Science Board, Feb 2005.
  • 2LIEBERMAN J. White Paper: National Security Aspects of the Global Migration of the U.S. Semiconductor Industry[R]. Airland Subcommittee, US Senate Armed Services Committee, June 2003.
  • 3ADEE S. The Hunt for the Kill Switch [J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 4MUTSCHLER A S. SEMI:Semi Equipment Industry Stands to Lose up to $4B Annually due to IP Infringements[J]. Electronic News, 2008,54 ( 18 ) :17-22.
  • 5DEAN COLLINS.Trust in Integrated Circuits and 3rd Party IP[C]//IEEE. International Workshop on Hardware-Oriented Trust Security,2008, Anaheim, CA. New York:IEEE. 2008:19-30.
  • 6AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan Detection Using IC Fingerprinting[C]//IEEE. Symposium on Security and Privacy, 2007, Berkeley, California. New York: IEEE, 2007:296- 310.
  • 7ABRAMOVICI M, BRADLEY P. Integrated Circuit Security New Threats and Solutions[C]//ACM. 5th Annual Workshop on Cyber Security Information Intellengence Research,2009. Oak Ridge,USA. New York:ACM, 2009:25-27.
  • 8CHAKRABORTY R S. Hardware Trojan: Threats and Emerging Solutions[C//IEEE. International High Level Design Validation Test Workshop,2009, San Francisco, CA. New York:IEEE, 2009:166- 171.
  • 9LIN L, BURLESON W, PARR C. MOLES: Malicious Off-Chip Leakage Enabled by Side-Channels[C]//IEEE. International Conference on Computer-Aided Design, 2009, San Jose, CA. New York: IEEE, 2009:117-122.
  • 10KING S. Designing and Implementing Malicious Hardware[C]// USENIX. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008, San Francisco, CA. Berkeley: USENIX Association,2008:1-8.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部