期刊文献+

一种木马电路的实现与特征分析 被引量:3

The Implementation and Analysis of a Trojan Circuit in IC Chips
在线阅读 下载PDF
导出
摘要 由于硬件木马等恶意电路的隐蔽性,攻击者可以利用其窃取机密信息,破坏硬件电路,造成严重的经济损失与社会危害.本文基于典型的芯片设计流程与EDA工具,首先建立硬件木马的电路模型,然后尝试在一简单ADC芯片中,利用其电路的剩余空间,设计实现了一种计数器木马电路.该木马电路的规模大约占芯片总面积的5.6%,将受污染的电路与真实电路一起用标准CMOS工艺HJ0.25μm流片,然后采用旁路功耗分析技术进行深入分析.实验数据表明,在正常工作情况下,受污染和没受污染的芯片功耗并无明显差异,而当木马触发条件满足时,受污染的芯片却成功的实现了攻击. Hidden Trojan circuits provide an attacker with a stealthy attack vector. Trojan circuits can bypass traditional defensive techniques as they occupy a layer below the entire software stack. We present the design and implementation of a counter Trojan circuits into a IC chip by standard CMOS technology HJ0. 25urn, then we analyze such flexible hardware allows powerful, general purpose attacks, while remaining surprisingly low in the amount of additional hardware.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第10期78-80,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(NSFC 61006020) 湖北省自然科学基金项目(2010CBD02705) 中央高校基本科研业务费专项资金(2011TS109)
关键词 芯片安全 恶意电路 硬件木马 计数器 ICs security malicious hardware trojan circuits counter
  • 相关文献

参考文献8

  • 1DARPA TRUST program information [EB/OL]. [2011- 11- 19]. http. ff www. acq. osd. mil/dsb/re- ports/2005-02- HPMS Report_Final. pdf.
  • 2Francis Wolff, Chris Papachristou, Swarup Bhunia, et al. Towards trojan-free trusted ics: problem analysis and detection scheme [C]// Proc. Design, Automation and Test in Europe Conf. 2008. (DATE'08). Germa- ny, Munich, 2008: 1362-1365.
  • 3Samuel T King, Joseph Tucek, Anthony Cozzie, et al. Designing and implementing malicious [C]/,/ hard- ware. Proe. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08 ). USA, Berheley, 2008: 1-8.
  • 4Yousra Alkabani, Farinaz Koushanfar. Extended ab- stract: designer' s hardware trojan horse [C]// IEEE International Workshop on Hardware-Oriented Securi- ty and Trust 2008 (HOST' 08). USA, Anaheim: IEEE CS Press,2008 : 82-83.
  • 5Yier Jim Nathan Kupp, Yiorgos Makris. Experiences in Hardware Trojan Design and Implementation [C]// 2nd IEEE In. Workshop on Hardware-Oriented Secur- ity and Trust (HOST' 09). USA.. San francisco, IEEE CS Press, 2009: 50-57.
  • 6Shiyanovskii Y, Wolff F, Papachristou C, et al. Hardware trojan by hot carrier injection [C] // CoRR2009. USA: San Francisco, 265-276.
  • 7邓秋成,白雪飞,郭立,王尧.ECC密码算法的差分功耗分析攻击研究[J].微电子学与计算机,2011,28(2):149-152. 被引量:3
  • 8李浪,焦铬,李仁发,李静.一种ECC加密芯片抗功耗攻击研究[J].微电子学与计算机,2011,28(1):27-30. 被引量:10

二级参考文献13

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:16
  • 2孙红霞,谭征.ECC密码技术及其优越性[J].信息技术与信息化,2005(4):87-88. 被引量:10
  • 3赵彦光,白国强,陈弘毅.一种针对特征2域椭圆曲线密码芯片的差分功耗分析[J].微电子学与计算机,2006,23(12):78-81. 被引量:5
  • 4童元满,王志英,戴葵,陆洪毅.可扩展公钥密码协处理器的设计与实现[J].小型微型计算机系统,2007,28(2):243-246. 被引量:1
  • 5Cilardo A, Coppolino L, Mazzocca N, et al. Elliptic curve cryptography engineering[J]. Proceedings of the IEEE,2006,94(2):395-405.
  • 6Kocher P, Joshua Jaffe, Benjamin Jun. Introduction to differential power analysis and related attacks [ EB/ OL]. [2009 - 09 - 19]. http..//www, cryptography. com/dpa/technical.
  • 7Itoh K , IZu T, Takenaka M. Address bit differential Power analysis of eryptographic schemes OK-ECDH and OK-ECDSA[C]. CHES' 2002, LNCS2523,2003 : 129-143.
  • 8Koeher, Jaffe P J, Jun B. Differential power analysis [J]. CRYPTO'99, 1999(LNCS 1666): 388-397.
  • 9Lopez J, Dahab R. Fast multiplication on elliptic curves over GF ( 2 ^ m) without precomputation [ J]. CHES 1999, 1999(LNCS 1717): 316-327.
  • 10hoh K, Izu T, Takenaka M. Address-bit differential power analysis of cryptographic schemes OK- ECDH and OK-ECDSA[J]. CHES 2000, 2000(LNCS 2523) : 129-143.

共引文献11

同被引文献20

  • 1Chakraborty RS, Narasimhan S, Bhunia S. Hardware tro jan: threats and emerging solutions. Proceedings of the international [C]// High l.evel Design Validation and Test Workshop. San Francisco: IEEE, 2009:166-171.
  • 2Yier Jin, Kupp N, Makris Y. Experiences in Hard ware trojan design and implementation[C]//IEEE In- ternational Workshop on. Hardware--Oriented Securi- ty and Trust. San Francisco: IEEE, 2009 : 50-57.
  • 3Sanno/3. Detecting hardware trojans[EB/OL]. [2013- 04-20]. http://www/crypto, rub. de/imperia/md/con- tent/seminare/itsss09/benjamin_ sanno, semembsee _ termpaper_20090723_final, pdf, 2009.
  • 4Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using ic fingerprinting[C]// Proceedings of the Berkeley, CA.-IEEE, Security and Privacy, 2007.
  • 5Li J, Lach J. At--speed delay characterization for IC au- thentication and trojan horse detection[C]//IEEE Interna- tional Workshop on. Hardware- Orented Security and Trust Anahein: CA, USA: IEEE, 2008: 8-14.
  • 6Rad R, Plusquellic J, Tehranipoor M. A sensitivity a- nalysis of power signal methods for detecting hardware trojans under real process and environmental conditions[J].IEEE Transactions on. Very I.arge Scale Integra- tion (VI.SI) Systems, 2010,18(12) : 1735-1744.
  • 7Salmani H, Tehranitxor M, Plusquellic J. A novel tech- nique for improving hardware trojan detection and reducing trojan activation time[J]. IEEE Transctions on Very Large Scale Integration (VI.SI) Systems, 2012, 20 ( 1 ) : 112-115.
  • 8任立儒.新情况下的特殊武器——硬件木马[J].中国电子科学研究院学报,2011,6(2):140-142. 被引量:2
  • 9刘华锋,罗宏伟,王力纬.硬件木马综述[J].微电子学,2011,41(5):709-713. 被引量:16
  • 10王晨旭,姜佩贺,喻明艳.芯片级木马检测技术研究综述[J].半导体技术,2012,37(5):341-346. 被引量:4

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部