期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Preventing Hardware Trojans in Switch Chip Based on Payload Decoupling
1
作者 Ke Song Binghao Yan +2 位作者 Xiangyu Li Qinrang Liu Ling OuYang 《China Communications》 SCIE CSCD 2021年第8期96-108,共13页
Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information syste... Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information systems to which they belong.Existing solutions generally rely on passive detection techniques.In this paper,a hardware Trojans active defense mechanism is designed for network switching chips based on the principle of encryption algorithm.By encoding the data entering the chip,the argot hidden in the data cannot trigger the hardware Trojans that may exist in the chip,so that the chip can work normally even if it is implanted with a hardware Trojans.The proposed method is proved to be effective in preventing hardware Trojans with different trigger characteristics by simulation tests and practical tests on our secure switching chip. 展开更多
关键词 network switching chip active defense hardware trojan payload decoupling
下载PDF
Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
2
作者 Lei Zhu Jinyue Gong +1 位作者 Liang Dong Cong Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5521-5537,共17页
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v... SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64. 展开更多
关键词 SKINNY-64-64 lightweight block cipher algebraic fault analysis hardware Trojan residual entropy
下载PDF
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
3
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
4
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware Trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
An Evolutionary Algorithm for Non-Destructive Reverse Engineering of Integrated Circuits
5
作者 Huan Zhang Jiliu Zhou Xi Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第6期1151-1175,共25页
In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuitwith the highest accuracy. However, this method has a much higher overhead in terms of time, effort, a... In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuitwith the highest accuracy. However, this method has a much higher overhead in terms of time, effort, and cost thanbypass detection. This study proposes an algorithm, called mixed-feature gene expression programming, whichapplies non-destructive reverse engineering to the chip with bypass detection data. It aims to recover the originalintegrated circuit hardware, or else reveal the unknown circuit design in the chip. 展开更多
关键词 hardware trojans Trojan detection mixed-feature gene expression programming
下载PDF
HTDet:A Clustering Method Using Information Entropy for Hardware Trojan Detection 被引量:5
6
作者 Renjie Lu Haihua Shen +3 位作者 Zhihua Feng Huawei Li Wei Zhao Xiaowei Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期48-61,共14页
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential threat.In this paper,we propose HTDet,a novel HT detection method using information entropybase... Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential threat.In this paper,we propose HTDet,a novel HT detection method using information entropybased clustering.To maintain high concealment,HTs are usually inserted in the regions with low controllability and low observability,which will result in that Trojan logics have extremely low transitions during the simulation.This implies that the regions with the low transitions will provide much more abundant and more important information for HT detection.The HTDet applies information theory technology and a density-based clustering algorithm called Density-Based Spatial Clustering of Applications with Noise(DBSCAN)to detect all suspicious Trojan logics in the circuit under detection.The DBSCAN is an unsupervised learning algorithm,that can improve the applicability of HTDet.In addition,we develop a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan logics.Experiments on circuit benchmarks demonstrate the effectiveness of HTDet. 展开更多
关键词 hardware Trojan(HT)detection information entropy Density-Based Spatial Clustering of Applications with Noise(DBSCAN) unsupervised learning CLUSTERING mutual information test patterns generation
原文传递
Trusted Integrated Circuits: The Problem and Challenges 被引量:4
7
作者 吕勇强 周强 +1 位作者 蔡懿慈 屈钢 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第5期918-928,共11页
Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible mil... Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed. 展开更多
关键词 hardware security trusted integrated circuit hardware Trojan IC authentication IP protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部