期刊文献+

硬件木马的分析与检测 被引量:1

Analysis and Detection of Hardware Trojan
在线阅读 下载PDF
导出
摘要 现在芯片在设计或制造过程中被植入硬件木马的可能性越来越大。为了避免发生大规模硬件木马的攻击,本文对硬件木马的危害、概念、分类和技术背景进行详细的阐述,同时介绍如今流行的4种硬件木马分析检测方法,并给出可行性方法的建议。 Nowadays the possibility of implanting hardware trojan in chip during the design and manufacturing process is growing higher and higher.In order to avoid large-scales hardware trojan attack,this paper elaborates detailedly the hazard,conception,classification and technical background of hardware trojan,introduces four currently popular hardware trojan detection methods,also gives recommendations for these feasibility methods.
出处 《计算机与现代化》 2012年第11期155-157,170,共4页 Computer and Modernization
关键词 芯片 硬件木马 分析 检测 chip hardware trojan analysis detection
  • 相关文献

参考文献12

  • 1Wang Xiaoxiao, Tehranipoor M, Plusquellic J. Detectingnmli- eious inclusions in secure hardware: Challenges and solutions [ C ]//Proceedings of the 2008 IEEE International Workshop on Hardware-oriented Security and Trust. 2008:15-19.
  • 2Miami University Libraries. Defense Science Board Task Force on High Performance Microehip Supply [ EB/OL]. http ://www. lib. muohio, edu/multifacet/reeord/mu3ugb 3599378, 2005-02-10.
  • 3King S T, Tucek J, Cozzie A, et al. Designing andimple- menting malicious hardware [ C ]// Proceedings of the 1st Usenix Workshop on Large-scale Exploits and Emergent Threats. 2008.
  • 4Lin Lang, Burleson W, Paar C. MOLES: Malieiousoff-ehip leakage enabled by side-channels [ C ]// Proceedings of the 2009 IEEE/ACM International Conference on Computer-ai- ded Design. 2009:117-122.
  • 5DARPA. Trust in Integrated Circuits (TIC) : Proposer In- formation Pamphlet [ EB/OL]. http://www, darpa, rail/ MTO/solicitations/baa07-24/index. html, 2007-07-24.
  • 6Tehranipoor M, Sunar B. Hardware trojan horses [ M ]// Towards Hardware-Intrinsic Security. 2010,3 : 167-187.
  • 7Banga M, Hsiao M. A novel sustained vector technique for the detection of hardware trojans [ C ]// Proceedings of the 22rid International Conference on VLSI Design. 2009: 327-332.
  • 8邹程,张鹏,邓高明,吴恒旭.基于功率旁路泄露的硬件木马设计[J].计算机工程,2011,37(11):135-137. 被引量:12
  • 9张鹏,邓高明,陈开颜,赵强.针对AES密码芯片的远场相关性电磁分析攻击[J].华中科技大学学报(自然科学版),2009,37(8):31-34. 被引量:9
  • 10Jin Y, Makris Y. Hardware trojan detection using path de- lay fingerprint [ C ]// Proceedings of the 2008 IEEE Inter- national Workshop on Hardware-oriented Security and Tntst. 2008:51-57.

二级参考文献17

  • 1Quisquater J J, Samyde D. Electromagnetic analysis (EMA).. measures and counter-measures for smard cards[C]// Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, LNCS 2140. Berlin/Heidelberg: Springer, 2001: 200-210.
  • 2Agrawal D, Archambeault B, Rao J R, et al. The EM side-channel(s) : attacks and assessment methodologies[C] //Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523. Berlin/Heidelberg: Springer, 2003: 29-45.
  • 3Peeters E, Standaert F X, Quisquater J J. Power and electromagnetic analysis., improved model, consequences and comparisons [J]. The VLSI Journal.. Embedded Cryptographic Hardware, 2007, 40 (1) :52-60.
  • 4Mulder E D, Ors S B, Preneel B, et al. Differential power and electromagnetic attacks on a FPGA imple- mentation of elliptic curve cryptosystems[J]. Computers and Electrical Engineering, 2007, 33 (5-6) : 367-382.
  • 5Sauvage L, Guilley S, Mathieu Y. Electromagnetic radiations of FPGAs: high spatial resolution cartography and attack of a cryptographic module[J]. ACM Transactions on Reconfigurable Technology and Systems, 2009, 2(1): 1-24.
  • 6Kim Changkyun, Schlaffer M, Moon S. Differential side channel analysis attacks on FPGA implementations of ARIA[J]. ETRI Journal: Information, Telecommunications & Electronics, 2008, 30 (2) : 315- 325.
  • 7Kocher P, Jaffe J, Jun B. Differential power analysis [C] //Advances in Cryptology-CRYPTO' 99, LNCS 1666. Berlin/Heidelberg: Springer, 1999: 388-397.
  • 8Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model[C]//Proceedings of Cryptographic Hardware and Embedded Systems CHES 2004, LNCS 3156. Berlin/Heidelberg Springer, 2004.. 16-29.
  • 9National Institute of Standards and Technology. FIPS-197:advanced encryption standard [ S ]. Gaithersburg:National Institute of Standards and Technology, 2001.
  • 10Mangard S, Oswald E, Popp T. Power analysis aat tacks--revealing the secrets of smart cards[M] New York : Springer , 2007.

共引文献19

同被引文献12

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部