一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于溫度特征分析的硬件木馬檢測(cè)方法

鐘晶鑫 王建業(yè) 闞保強(qiáng)

鐘晶鑫, 王建業(yè), 闞保強(qiáng). 基于溫度特征分析的硬件木馬檢測(cè)方法[J]. 電子與信息學(xué)報(bào), 2018, 40(3): 743-749. doi: 10.11999/JEIT170443
引用本文: 鐘晶鑫, 王建業(yè), 闞保強(qiáng). 基于溫度特征分析的硬件木馬檢測(cè)方法[J]. 電子與信息學(xué)報(bào), 2018, 40(3): 743-749. doi: 10.11999/JEIT170443
ZHONG Jingxin, WANG Jianye, KAN Baoqiang. Hardware Trojan Detection Through Temperature Characteristics Analysis[J]. Journal of Electronics & Information Technology, 2018, 40(3): 743-749. doi: 10.11999/JEIT170443
Citation: ZHONG Jingxin, WANG Jianye, KAN Baoqiang. Hardware Trojan Detection Through Temperature Characteristics Analysis[J]. Journal of Electronics & Information Technology, 2018, 40(3): 743-749. doi: 10.11999/JEIT170443

基于溫度特征分析的硬件木馬檢測(cè)方法

doi: 10.11999/JEIT170443

Hardware Trojan Detection Through Temperature Characteristics Analysis

  • 摘要: 硬件木馬是一種在特定條件下使集成電路失效或泄露機(jī)密信息等的惡意電路,給現(xiàn)代信息系統(tǒng)帶來(lái)了嚴(yán)重的安全隱患。該文基于硬件木馬在芯片工作之初造成的溫度響應(yīng)特征,提出一種利用芯片溫度變化特性并進(jìn)行比對(duì)的硬件木馬檢測(cè)方法。該方法采用環(huán)形振蕩器作為片內(nèi)溫度特征測(cè)量傳感器,提取溫度變化特征信息,并采用曲線擬合評(píng)價(jià)指標(biāo)來(lái)評(píng)估硬件木馬對(duì)溫度變化特征的影響,通過(guò)比對(duì)無(wú)木馬芯片溫度響應(yīng)特征從而完成木馬檢測(cè)。通過(guò)對(duì)10個(gè)不同芯片的檢測(cè),結(jié)果表明該方法能夠?qū)γ娣e消耗32個(gè)邏輯單元硬件木馬的檢測(cè)率達(dá)到100%,對(duì)16個(gè)邏輯單元檢測(cè)概率也能達(dá)到90%;同時(shí)檢測(cè)結(jié)果表明該方法完成硬件木馬檢測(cè)后,能夠?qū)τ布抉R的植入位置進(jìn)行粗定位。
  • 劉長(zhǎng)龍. 基于側(cè)信道分析的硬件木馬檢測(cè)技術(shù)研究[D]. [博士論文], 天津大學(xué), 2013: 1-8.
    LIU C L. Research of hardware Trojans detection technology based on side channel analysis[D]. [Ph.D. dissertation], Tianjin University, 2013: 1-8.
    YANG K and HICKS M. Analog malicious hardware[C]. IEEE Symposium on Security and Privacy Conference, San Jose, USA, 2016: 18-37. doi: 10.1109/SP.2016.10.
    SUBRAMANYAN P, TSISKARIDZE N, and LI Wenchao. Reverse engineering digital circuits using structural and functional analyses[J]. IEEE Transactions on Emerging Topics in Computing, 2014, 2(1): 63-80. doi: 10.1109/TETC. 2013.2294918.
    BAO Chongxi, FORTE D , and SRIVASTAVE A. On Reverse engineering-based hardware Trojan detection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(1): 49-57. doi: 10.1109/TCAD. 2015.2488495.
    AGRAWAL D and BAKTIR S. Trojan detection using IC fingerprinting[C]. IEEE Symposium on Security and Privacy Conference, Berkeley, USA, 2007: 296-310. doi: 10.1109/SP. 2007.36.
    JIN Y and MAKRIS Y. Hardware Trojan detection using path delay fingerprint[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 51-57. doi: 10.1109/HST.2008.4559049.
    AARESTAD J, ACHARYYA D, and RAD R. Detecting Trojans through leakage current analysis using multiple supply pad IDDQs[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 893-904. doi: 10.1109/ TIFS.2010.2061228.
    NOWROZ A N, HU Kangqiao, and KOUSHANFAR F. Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps[J]. IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 2014, 33(12): 1792-1805. doi: 10.1109/TCAD.2014.2354293.
    SOLL O and KORAK T. EM-based detection of hardware Trojans on FPGAs[C]. IEEE International Symposium on Hardware-Oriented Security and Trust Conference, California, USA, 2014: 84-87. doi: 10.1109/HST.2014. 6855574.
    NGO X T, NAJM Z, and BHASIN S. Method taking into account process dispersion to detect hardware Trojan horse by side-channel analysis[J]. Journal of Cryptographic Engineering, 2016, 6(3): 239-247. doi: 10.1007/s13389-016- 0129-2.
    汪鵬君, 張躍軍, 張學(xué)龍, 等. 防御差分功耗分析攻擊技術(shù)研究[J]. 電子與信息學(xué)報(bào), 2012, 34(11): 2774-2784. doi: 10.3724 /SP.J.1146.2012.00555.
    WANG Pengjun, ZHANG Yuejun, ZHANG Xuelong, et al. Research of differential power analysis countermeasures[J]. Journal of Electronics Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555.
    SREEDHAR A, KUNDU S, and KOREN I. On reliability Trojan injection and detection[J]. Journal on Low Power Electronics, 2012, 8(5): 674-683. doi: 10.1166/jolpe.2012. 1225.34.
    薛明富, 胡愛(ài)群, 王箭. 基于探索式分區(qū)和測(cè)試向量生成的硬件木馬檢測(cè)方法[J]. 電子學(xué)報(bào), 2016, 44(5): 1132-1138. doi: 10.3969/j.issn.0372-2112.2016.05.017.
    XUE Mingfu, HU Aiqun, and WANG Jian. A novel hardware Trojan detection technique using heuristic partition and test pattern generation[J]. Acta Electronica Sinica, 2016, 44(5): 1132-1138. doi: 10.3969/j.issn.0372-2112.2016.05.017.
    KULKARNI A, PINO Y, and MOHSENIN T. SVM-based real-time hardware Trojan detection for many-core platform[C]. IEEE International Symposium on Quality Electronic Design Conference, California, USA, 2016: 362-367. doi: 10.1109/ISQED.2016.7479228.
    CHAKRABORTY R S and PAUL S. On-demand transparency for improving hardware Trojan detectability[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 48-50. doi: 10.1109/HST.2008.4559048.
    ZHOU Bin, ZHANG Wei, THAMBIPILLAI S, et al. Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(5): 792-805. doi: 10.1109/TCAD.2015.2460551.
    LI Jie and LACH J. At-speed delay characterization for IC authentication and Trojan horse detection[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 8-14. doi: 10.1109/ HST.2008.4559038.
    JIN Y and KUPP N. DFTT: Design for Trojan test[C]. IEEE International Conference on Electronics Circuits Systems, Athens, Greece, 2010: 1168-1171. doi: 10.1109/ ICECS.2010.5724725.
    ZHANG Xuihui and TEHRANIPOOR M. RON: An on-chip ring oscillator network for hardware Trojan detection[C]. Design Automation Test in Europe Conference Exhibition, Grenoble, France, 2011: 1-6. doi: 10.1109/DATE. 2011.5763260.
    XIAO Kan and TEHRANIPOOR M. BISA: Built-in self-authentication for preventing hardware Trojan insertion[C]. IEEE International Symposium on Hardware- Oriented Security and Trust Conference, Anaheim, USA, 2013: 45-50. doi: 10.1109/HST.2013.6581564.
    WU Tony F, GANESAN K, HU Yunqing, et al. TPAD: Hardware Trojan prevention and detection for trusted integrated circuits[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(4): 521-534. doi: 10.1109/TCAD.2015.2474373.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  1183
  • HTML全文瀏覽量:  132
  • PDF下載量:  229
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-05-11
  • 修回日期:  2017-09-18
  • 刊出日期:  2018-03-19

目錄

    /

    返回文章
    返回