期刊文献+

基于混合特征分析的硬件木马检测方法 被引量:5

Hardware Trojan detection method based on combined features analysis
原文传递
导出
摘要 提出一种基于混合特征分析的硬件木马检测方法,该方法首先在时序层级抽象并构建待测电路的控制数据流图,然后利用功能性分析方法建立以低动态翻转率为特征的动态可疑节点集,最终使用静态结构特征匹配方法实现硬件木马的检出.以Trust-Hub中涵盖Basic-RSA,AES和RS232基准电路在内的13种硬件木马为检测对象开展检测实验.实验结果表明:检测结果中硬件木马节点检出率达到100%,假阳性率控制在1.5%以内,检测准确率达到82.5%以上,证明了该检测方法的有效性. A hardware Trojan detection method based on combined features analysis was proposed.The control data flow graph of the circuit under test was built first utilizing the gate-level netlist, and then nodes with low dynamic transition probability were screened to establish a suspicious set using functional analysis.The hardware Trojans could be finally detected by the corresponding static structural features.Experiments were carried out on Basic-RSA,AES and RS232 reference circuits in Trust-Hub covering 13 kinds of hardware Trojans. Experimental results show that the detection rate is 100% with a false positive rate under 1.5% and accuracy over 82.5%,demonstrating the effectiveness of the proposed method.
作者 赵毅强 李博文 马浩诚 何家骥 ZHAO Yiqiang;LI Bowen;MA Haocheng;HE Jiaji(School of Microelectronics,Tianjin University,Tianjin 300072,China;Institute of Microelectronics,Tsinghua University,Beijing 100084,China)
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2021年第5期1-6,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61832018)。
关键词 硬件木马 控制数据流图 低动态翻转率 静态结构特征 假阳性率 准确率 hardware Trojan control data flow graph low dynamic transition probability static structural feature false positive rate accuracy
  • 相关文献

参考文献2

二级参考文献8

  • 1苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 2Bhunia S, Hsiao M S, Bavga M, et ak Hardware Trojan Attacks: Threat Analysis and Countermeasures[J]. Pro- ceedings of the IEEE, 2014,10(8):1229-1247.
  • 3Xiao K, Forte D, Tehranipoor M. A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans[J]. IEEE Transactions on comput- er-aided design of integrated circuits and systems, 2014,33(12) :1778-1791.
  • 4Shila D M, Venugopal V. Design, implementation and security analysis of Hardware Trojan Threats in FP- GA[C]//Proc of IEEE Communication and Informa- tion Systems Security Symposium. New York, NY, USA: ACM, 2014. 247-24.
  • 5Holland J H. Adaptation in natural and artificial sys- tems: an introductory analysis with applications to bi- ology, control, and artificial intelligence[M].2nd ed. Cambridge: MIT Press, 1992.
  • 6Kitsos P, Voyiatzis A G. FPGA trojan detection using length-optimized ring oscillators [C] /// Proc of 17th Euromicro Conference on Digital System Design. Paris kitsos: IEEE, 2014 : 675-678.
  • 7张鹏,王新成,周庆.基于电磁辐射信号分析的芯片硬件木马检测[J].电子学报,2014,42(2):341-346. 被引量:11
  • 8赵毅强,冯紫竹,史亚峰,刘长龙.一种基于缩短激活时间的硬件木马检测方法[J].华中科技大学学报(自然科学版),2014,42(6):85-89. 被引量:2

共引文献6

同被引文献44

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部