摘要
针对硬件木马的隐蔽性强和检测效率低等问题,提出一种基于电路活性测度的硬件木马检测方法.通过从恶意攻击者的角度分析电路,在电路的少态节点处植入木马激活模块(TAM),该方法可有效提升电路的整体活动性,进而提高硬件木马的激活度.以ISCAS'89基准电路S713为研究对象进行仿真验证,实验结果表明:TAM结构可将电路活动性提升1.7倍.在此基础上建立基于FPGA的测试平台开展侧信道分析实验,并采用主成分分析方法,实现低活性硬件木马的检测.
Considering hardware Trojan?s characteristic of concealment and low detection resolution,a hardware Trojan detection method based on circuit activity was proposed. The circuit was analyzed from the view of malicious attackers and the Trojan activation module(TAM) was inserted at low activity nodes.This method effectively improves the activity of the circuit and then improves the activity of the hardware Trojan. ISCAS'89 benchmark circuit S713 was exploited to carry out the simulation and hardware verification.Experimental results show that TAM can improve the circuit activity by 1.7 times.On this basis,a test platform was built based on FPGA to carry out side-channel analysis experiments,and by means of the principal component analysis method,the low-active hardware Trojan detection was achieved.
作者
赵毅强
解啸天
刘燕江
刘阿强
Zhao Yiqiang Xie Xiaotian Liu Yanjiang Liu Aqiang(a The School ofMicroelectronics; b Tianjin Key Laboratory of Imaging and Sensing Microelectronic Technology, TianjinUniversity, Tianjin300072, Chin)
出处
《华中科技大学学报(自然科学版)》
EI
CAS
CSCD
北大核心
2018年第2期90-94,共5页
Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金
国家自然科学基金资助项目(61376032)
关键词
硬件木马
翻转率
活性测度
木马检测
侧信道分析
hardware Trojan
transition rate
activity
Trojan detection
side-channel analysis