期刊文献+

基于子空间域特征提取的硬件木马检测方法 被引量:6

Detecting hardware Trojan through feature extraction in subspace domain
在线阅读 下载PDF
导出
摘要 为了解决制造变异和噪声对已有硬件木马检测方法的挑战和干扰,提出了一种新的微弱木马信号检测技术,能够在较大的制造变异和噪声的背景下提取出木马特征信号.首先,将木马检测问题建模为特征提取模型,然后提出了一个基于时域约束估计器和主成分投影的统一子空间木马检测方法.并通过特定的子空间投影或重构信号分析,证实弱小的木马信号可以与各种噪声和干扰区分开来.该方法为已有的硬件木马检测方法提供了一种通用的消除制造变异和噪声影响的方法.设计实现了2个时序硬件木马,在ISCAS89基准电路上进行了仿真实验验证,并在FPGA上进行了硬件实物验证,实验结果均表明了所提方法的有效性和高检测精度. In order to eliminate the challenge and interference of the process variation and noises on existing hardware Trojan detection methods,a novel hardware Trojan detection technique is presen-ted,which can detect tiny hardware Trojan characteristics under large process variation and back-ground noises.First,the hardware Trojan detection problem is mathematically formulated as a fea-ture extraction model.Then,a unified subspace hardware Trojan detection technique is proposed based on time domain constrained estimator and principal component projection.It is proved that the weak hardware Trojan signal can be distinguished from various noise sources through particular sub-space projections or reconstructed clean signal analysis.The proposed technique provides a general method for related works to eliminate the impact of process variations and noises.Two sequential hardware Trojans are designed and implemented.Both simulation experiments on ISCAS89 bench-mark circuits and hardware validations on FPGA (field programmable gate array)boards show the effectiveness and high sensitivity of the proposed hardware Trojan detection technique.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第3期457-461,共5页 Journal of Southeast University:Natural Science Edition
基金 国家发展改革委员会信息安全专项基金资助项目
关键词 硬件木马检测 硬件安全 信息安全 子空间域 hardware Trojan detection hardware security information security subspace domain
  • 相关文献

同被引文献41

  • 1董师师,黄哲学.随机森林理论浅析[J].集成技术,2013,2(1):1-7. 被引量:163
  • 2苏静,赵毅强,何家骥,刘沈丰.旁路信号主成分分析的欧式距离硬件木马检测[J].微电子学与计算机,2015,32(1):1-4. 被引量:13
  • 3张华伟,王明文,甘丽新.基于随机森林的文本分类模型研究[J].山东大学学报(理学版),2006,41(3):5-9. 被引量:61
  • 4Jacob N,Merli D,Heyszl J,et al.Hardware Trojans:current challenges and approaches[J].IET Computers&Digital Techniques,2014,8(6):264-273.
  • 5Tehranipoor M,Koushanfar F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design&Test of Computers,2010,27(1):10-25.
  • 6Bhunia S,Hsiao M S,Banga M,et al.Hardware trojan attacks:threat analysis and countermeasures[J].Proceedings of the IEEE,2014,102(8):1229-1247.
  • 7Kubat M.Neural networks:a comprehensive foundation by Simon Haykin,Macmillan[J].The Knowledge Engineering Review,1999,13(4):409-412.
  • 8Rad R,Plusquellic J,Tehranipoor M.Sensitivity analysis to hardware Trojans using power supply transient signals[C]∥Proc of Hardware-Oriented Security and Trust(HOST).Anaheim:IEEE Press,2008:3-7.
  • 9Reece T,Robinson W H.Analysis of data-leak hardware Trojans in AES cryptographic circuits[C]∥Proc of Technologies for Homeland Security(HST).New York:IEEE Press,2013:467-472.
  • 10任立儒.新情况下的特殊武器——硬件木马[J].中国电子科学研究院学报,2011,6(2):140-142. 被引量:2

引证文献6

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部