期刊文献+

芯片级木马检测技术研究综述 被引量:4

Survey of Hardware Trojan Horse Detection on Chip
原文传递
导出
摘要 集成电路在各个领域都具有极其重要的作用,但是在当今集成电路设计、制造、测试、封装各种环节相分离的产业模式下,用户所使用的芯片可能会被别有用心者植入硬件特洛伊木马电路,这给信息安全领域带来了严重威胁,芯片级硬件木马的检测技术已经成为了芯片安全研究领域的新热点。首先介绍了硬件木马的概念、危害以及分类方式;然后对硬件木马检测技术国内外有影响的研究成果进行了详细的总结和评述,着重阐述了目前比较有效的旁路分析方法,指出基于功耗指纹分析的硬件木马检测技术是当前最有前途的一种检测方法;最后简要总结了硬件木马的主动防御机制。 The integrated circuit(IC)plays an important role in many fields,but the Hardware Trojan Horse(HTH)can be maliciously implanted into ICs by attackers because of separated IC design and fabrication mode.The existence of HTH threatens the information security.HTH detection begins to attract widely attention and comes into a new research field.Firstly,the concept of HTH,its hazards and its classification were described.Then some important researches on HTH detection approach were summarized.The researchers focus on side channel analysis detection,in which the power finger analysis techniques are the promising method to detect HTH.Finally,the proactive defense mechanisms of HTH were also summed up briefly.
出处 《半导体技术》 CAS CSCD 北大核心 2012年第5期341-346,共6页 Semiconductor Technology
关键词 硬件特洛伊木马 信息安全 检测技术 旁路分析 主动防御机制 Hardware Trojan Horse(HTH) information security detection approach side-channel analysis proactive defense mechanisms
  • 相关文献

参考文献20

  • 1Defense Science Board.Report of the defense science board task force on high performance microchip supply[R].Washington DC:Defense Science Board,2005.
  • 2LIEBERMAN J.White paper:national security aspects of the global migration of the U.S.semiconductor Industry[J].Congressional Record,2003,149(82):7468-7471.
  • 3ADEE S.The hunt for the kill switch[J].IEEE Spectrum,2008,45(5):34-39.
  • 4Innovation at risk-intellectual property challenges and opportunities[R].Semiconductor Equipment and Materials International,2008.
  • 5CHAKRABORTY R S,NARASIMHAN S,BHUNIA S.Hardware Trojan:threats and emerging solutions[C]∥Proceedings of IEEE International High Level Design Validation and Test Workshop.San Francisco,CA,USA,2009:166-171.
  • 6WANG X X,TEHRANIPOOR M,PLUSQUELLIC J.Detectingmalicious inclusions in secure hardware:challenges and solutions[C]∥Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.Anaheim,CA,USA,2008:15-19.
  • 7JIN Y,KUPP N,MAKRIS Y.Experiences in hardware Trojan design and implementation[C]∥Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust.San Francisco,CA,USA,2009:50-57.
  • 8邹程,张鹏,邓高明,吴恒旭.基于功率旁路泄露的硬件木马设计[J].计算机工程,2011,37(11):135-137. 被引量:12
  • 9张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 10SANNO B.Detecting hardware Trojans[EB/OL].2009-07-23.http:∥www.emsec.rub.de/media/crypto/attachments/files/2011/03/benjamin_sanno.semembsec_termpaper_20090723_final.pdf.

二级参考文献18

  • 1Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]//1st IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscataway:IEEE Press, 2008: 15-19.
  • 2U S D of Defense. Defense science board task force on high performance microchip supply[DB/CD][2010-01-10]. http://www. acq. osd. mil/dsb/reports/2005-02 HPMS Report Final. pdf.
  • 3Adee S. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39.
  • 4King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware [C]// Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008: 1-8.
  • 5Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]// Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2007: 296- 310.
  • 6Lin L, Burleson W, Paar C. MOLES: Malicious offchip leakage enabled by side-channels [C]//Proceed ings of the 2009 International Conference on Computer-aided Design. New York: ACM, 2009: 117-122.
  • 7Banga M, Hsiao M S. A region based approach for the identification of hardware trojans[C]//IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 40-47.
  • 8Chakraborty R, Paul S, Bhunia S. On-demand transparency for improving hardware trojan detectability [C]//IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscat-away:IEEE Press, 2008: 48-50.
  • 9Rad R M, Wang X, Tehranipoor M, et al. Power supply signal calibration techniques for improving detection resolution to hardware troians[C]// Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design. Piscataway: IEEE Press, 2008: 632-639.
  • 10Jin Y, Makris Y. Hardware trojan detection using path delay fingerprint[C]//1st IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 51- 57.

共引文献25

同被引文献31

  • 1Tehranipoor M,Koushanfar F. A survey of hardwaretrojan taxonomy and detection [J], IEEE Design &Test of Computers, 2010,27(1) : 10-25.
  • 2Wang X,Tehranipoor M, Plusquellic J. Detecting ma-licious inclusions in secure hardware : challenges andsolutions [C]// 1st IEEE International Workshop onHardware - Oriented Security and Trust (HOST).Anaheim, CA: IEEE Press,2008: 15-19.
  • 3Agrawal D,Baktir S,Karakoyunlu D, et al. Trojandetection using IC fingerprinting[C]//IEEE Symposi-um on Security and Privacy. Oakland, CA: IEEEPress, 2007 : 296-310.
  • 4Koushanfar F, Mirhoseini A, A unified framework formultimodal submodular integrated circuits trojan detec-tion[J]. IEEE Transactions on Information and Securi-ty, 2011, 6(1):162-174.
  • 5Jin Y,Makris Y. Hardware trojan detection usingpath delay fingerprint [Cj//lst IEEE InternationalWorkshop on Hardware-Oriented Security and Trust(HOST). Anaheim,CA: IEEE Press, 2008:51-57.
  • 6Quisquater J J, Samyde D. Electromagnetic analysis(EMA) : measures and countermeasures for smard cards[C]// Smart Card Programming and Security, Interna-tional Conference on Research in Smart Cards . E-smart2001. Berlin/ Heidelberg : Springer, 2001 : 200-210.
  • 7Tehranipoor M, Koushanfar F.A survey of hardware trojan tax- onomy and detection[ J]. IEEE Design & Test of Computers, 2010,27(1) : 10- 25.
  • 8Koushanfar F, Mirhoseini A. A unified framework for multi- modal submodular integrated circuits trojan detection[ J]. IF, F.E Transactions on Information and Security, 2011,6( 1 ):162- 174.
  • 9Jill Y, Makris Y. Hardware trojan detection using path delay fingerprint[ A ]. IEEE International Workshop on Hardware- Oriented Security and Trust (HOST) [ C ]. Anaheim: IE EE Computer Society, 2008.51 - 57.
  • 10Agrawal D, Bakfir S, Karakoyunlu D, et al. Trojan detection us- hag IC fingerprintirtg[ A ]. IEEE Symposium on Security and Privacy [ C ]. Berkeley: IEFF. Computer Society, 2007. 296 - 310.

引证文献4

二级引证文献185

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部