Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu...Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.展开更多
According to the reciprocity principle, we propose an efficient model to compute the shielding effectiveness of a rectangular cavity with apertures covered by conductive sheet against an external incident electromagne...According to the reciprocity principle, we propose an efficient model to compute the shielding effectiveness of a rectangular cavity with apertures covered by conductive sheet against an external incident electromagnetic wave. This problem is converted into another problem of solving the electromagnetic field leakage from the cavity when the cavity is excited by an electric dipole placed within it. By the combination of the unperturbed cavity field and the transfer impedance of the sheet, the tangential electric field distribution on the outer surface of the sheet is obtained. Then, the field distribution is regarded as an equivalent surface magnetic current source responsible for the leakage field. The validation of this model is verified by a comparison with the circuital model and the full-wave simulations. This time-saving model can deal with arbitrary aperture shape, various wave propagation and polarization directions, and the near-field effect.展开更多
We are interested in this work to electromagnetic leakage, for example the door of the microwave oven (or shielding of electronic functions working in the microwave band containing holes for ventilation circuit) which...We are interested in this work to electromagnetic leakage, for example the door of the microwave oven (or shielding of electronic functions working in the microwave band containing holes for ventilation circuit) which must be transparent (chain link) but the level of electromagnetic leakage issued by this device must not exceed certain standards. This work started with this article in which we are interested in a simple structure consisting of a multilayer structure incorporating a radiating aperture. We show in this paper mainly the interests of this study and the limitations of using these structures. Modeling of this device is provided by the wave concept iterative procedure (WCIP) which is simple to implement and is characterized by the fast execution method. The validation of our work is carried out by comparing our results with those calculated by the Ansoft HFSS software which shows a good agreement.展开更多
A hardware platform using broadband antenna,oscilloscope,and spectrum analyzer is designed to receive radio frequency(RF)signals from electromagnetic radiation leakage of computers in the office environment.The proces...A hardware platform using broadband antenna,oscilloscope,and spectrum analyzer is designed to receive radio frequency(RF)signals from electromagnetic radiation leakage of computers in the office environment.The process of receiving and the processing techniques have also been given.Then,the software radio-based computing models and software algorithms are proposed to demodulate and decode the RF signals.An experimental result shows that the text information can be recovered from electromagnetic(EM)leakage wave of computer by this interception system.This architecture not only reduces the cost of the system’s hardware but also makes interception more flexible.The innovation points of this paper are recovering the video information in EM leakage wave of computers in an ordinary office environment based on public equipments and proposing the process of receiving processing techniques that only use the software radiobased computing models and software algorithms.展开更多
基金supported by the Special Funds for Basic Scientific Research Business Expenses of Central Universities No. 2014GCYY0the Beijing Natural Science Foundation No. 4163076the Fundamental Research Funds for the Central Universities No. 328201801
文摘Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.
基金Project supported by the National Natural Science Foundation of China(Grant No.51307055)in part by the State Grid Corporation of China(Grant No.No.SGRI-WD-71-12-009)
文摘According to the reciprocity principle, we propose an efficient model to compute the shielding effectiveness of a rectangular cavity with apertures covered by conductive sheet against an external incident electromagnetic wave. This problem is converted into another problem of solving the electromagnetic field leakage from the cavity when the cavity is excited by an electric dipole placed within it. By the combination of the unperturbed cavity field and the transfer impedance of the sheet, the tangential electric field distribution on the outer surface of the sheet is obtained. Then, the field distribution is regarded as an equivalent surface magnetic current source responsible for the leakage field. The validation of this model is verified by a comparison with the circuital model and the full-wave simulations. This time-saving model can deal with arbitrary aperture shape, various wave propagation and polarization directions, and the near-field effect.
文摘We are interested in this work to electromagnetic leakage, for example the door of the microwave oven (or shielding of electronic functions working in the microwave band containing holes for ventilation circuit) which must be transparent (chain link) but the level of electromagnetic leakage issued by this device must not exceed certain standards. This work started with this article in which we are interested in a simple structure consisting of a multilayer structure incorporating a radiating aperture. We show in this paper mainly the interests of this study and the limitations of using these structures. Modeling of this device is provided by the wave concept iterative procedure (WCIP) which is simple to implement and is characterized by the fast execution method. The validation of our work is carried out by comparing our results with those calculated by the Ansoft HFSS software which shows a good agreement.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.60871081,60671055,and 60771060)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Nos.20070013002 and 20070013004).
文摘A hardware platform using broadband antenna,oscilloscope,and spectrum analyzer is designed to receive radio frequency(RF)signals from electromagnetic radiation leakage of computers in the office environment.The process of receiving and the processing techniques have also been given.Then,the software radio-based computing models and software algorithms are proposed to demodulate and decode the RF signals.An experimental result shows that the text information can be recovered from electromagnetic(EM)leakage wave of computer by this interception system.This architecture not only reduces the cost of the system’s hardware but also makes interception more flexible.The innovation points of this paper are recovering the video information in EM leakage wave of computers in an ordinary office environment based on public equipments and proposing the process of receiving processing techniques that only use the software radiobased computing models and software algorithms.