期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
1
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
HTDet:A Clustering Method Using Information Entropy for Hardware Trojan Detection 被引量:5
2
作者 Renjie Lu Haihua Shen +3 位作者 Zhihua Feng Huawei Li Wei Zhao Xiaowei Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期48-61,共14页
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential threat.In this paper,we propose HTDet,a novel HT detection method using information entropybase... Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential threat.In this paper,we propose HTDet,a novel HT detection method using information entropybased clustering.To maintain high concealment,HTs are usually inserted in the regions with low controllability and low observability,which will result in that Trojan logics have extremely low transitions during the simulation.This implies that the regions with the low transitions will provide much more abundant and more important information for HT detection.The HTDet applies information theory technology and a density-based clustering algorithm called Density-Based Spatial Clustering of Applications with Noise(DBSCAN)to detect all suspicious Trojan logics in the circuit under detection.The DBSCAN is an unsupervised learning algorithm,that can improve the applicability of HTDet.In addition,we develop a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan logics.Experiments on circuit benchmarks demonstrate the effectiveness of HTDet. 展开更多
关键词 hardware trojan(HT)detection information entropy Density-Based Spatial Clustering of Applications with Noise(DBSCAN) unsupervised learning CLUSTERING mutual information test patterns generation
原文传递
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
3
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部