期刊文献+

基于侧信道分析的硬件木马建模与优化 被引量:13

Side channel analysis-based modeling and optimizing of hardware Trojan
原文传递
导出
摘要 针对集成电路中的硬件木马问题,开展了基于侧信道分析的硬件木马电路功耗模型的设计和优化工作.在完成建模的基础上,分析了木马电路对模型参数的影响.针对木马检测中的工艺偏差噪声问题,提出了一种基于主成分分析的模型优化算法.该方法利用协方差矩阵完成数据的投影变换,从而减小工艺偏差噪声对测试的影响.经仿真验证表明建立的模型与实验得到的数据基本符合.通过对测试电路进行蒙特卡罗分析,完成了工艺偏差噪声的仿真,同时验证了模型优化算法的有效性. A power consumption model for the hardware Trojan was proposed and optimized based on side channel analysis. Then, the influence of the Trojan circuit on the model parameters was analyzed. An optimization algorithm through the principal component analysis was presented to deal with the process variation noise in the Trojan detection. This method which utilizes covariance matrix to archive data transformation can reduce the influence of process variation in the tests. The simulation results show that the proposed model is basically in line with the experimental data. Monte Carlo analysis was used to simulate the process variation of test circuits, and the effectiveness of the model optimization algorithm was validated.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第2期53-57,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 天津市自然科学基金重点资助项目(12JCZDJC20500)
关键词 电路建模 硬件木马 侧信道分析 工艺偏差 主成分分析 蒙特卡罗分析 circuit modeling hardware Trojan side channel analysis process variation principal component analysis Monte Carlo analysis
  • 相关文献

参考文献11

  • 1Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection[J]. IEEE Design Test of Computers, 2010, 27(1) : 10-25. 被引量:1
  • 2张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 3Aarestad J, Acharyya D, Rad R, et al. Detecting Tro)ans through leakage current analysis using multi- ple supply pad IDDQ[J]. IEEE Transactions on Inor- mation Forensics and Security, 2010, 5(4) : 893-904. 被引量:1
  • 4Rad R, Plusquellic J, Tehranipoor M. A sensitivity analysis of power signal methods for detecting hard -ware Trojans under real process and environmental conditions [J].IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2010, 18 (12) : 1735-1744. 被引量:1
  • 5Sheng Wei, Potkonjak M. Scalable segmentation- based malicious circuitry detection and diagnosis [C]//IEEE/ACM International Conference on Com- puter-Aided Design. San Jose.. IEEE Press, 2010: 483-486. 被引量:1
  • 6Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits Trojan de- tection[J]. IEEE Transactions on Information Foren- sics and Security, 2011, 6(1): 162-174. 被引量:1
  • 7Lamech C, Rad R, Tehranipoor M, et al. An experi- mental analysis of power and delay signal-to-noise re- quirements for detecting Trojans and methods for a- chieving the required detection sensitivities[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 142-155. 被引量:1
  • 8Agrawal D, Baktir S, Karakoyunlu D. Trojan detec- tion using IC fingerprinting[C]//IEEE Symposium on Security and Privacy. Berkeley: IEEE Press, 2007: 296-310. 被引量:1
  • 9Jin Y, Makris Y. Hardware Trojans in wireless cryp- tographic integrated circuits [J]. IEEE Design and Test of Computers, 2010, 27(1): 26-35. 被引量:1
  • 10Shlens J. A tutorial on principal component analysis [R]. San Diego: University of California, San Die- go, 2005. 被引量:1

二级参考文献12

  • 1Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]//1st IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscataway:IEEE Press, 2008: 15-19. 被引量:1
  • 2U S D of Defense. Defense science board task force on high performance microchip supply[DB/CD][2010-01-10]. http://www. acq. osd. mil/dsb/reports/2005-02 HPMS Report Final. pdf. 被引量:1
  • 3Adee S. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39. 被引量:1
  • 4King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware [C]// Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008: 1-8. 被引量:1
  • 5Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]// Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2007: 296- 310. 被引量:1
  • 6Lin L, Burleson W, Paar C. MOLES: Malicious offchip leakage enabled by side-channels [C]//Proceed ings of the 2009 International Conference on Computer-aided Design. New York: ACM, 2009: 117-122. 被引量:1
  • 7Banga M, Hsiao M S. A region based approach for the identification of hardware trojans[C]//IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 40-47. 被引量:1
  • 8Chakraborty R, Paul S, Bhunia S. On-demand transparency for improving hardware trojan detectability [C]//IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscat-away:IEEE Press, 2008: 48-50. 被引量:1
  • 9Rad R M, Wang X, Tehranipoor M, et al. Power supply signal calibration techniques for improving detection resolution to hardware troians[C]// Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design. Piscataway: IEEE Press, 2008: 632-639. 被引量:1
  • 10Jin Y, Makris Y. Hardware trojan detection using path delay fingerprint[C]//1st IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 51- 57. 被引量:1

共引文献16

同被引文献76

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2Lin L, Burleson W, Paar C. MOLES: molicious off-chip leakage en- abled by side-channels. Proceedings of the 2009 International Confer- ence on Computer-aided Design. New York: ACM, 2009:117--122. 被引量:1
  • 3Abramovici M, Bradley P. Integrated circuit security-new threats and solutions. Cyber Security and Information Infrastructure ResearchWorkshop ( CSIIRW'09 ), 2009. 被引量:1
  • 4Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojan detection. IEEE Transactions on Information Forensics and Security, 2011 ,6 ( 1 ) : 162--174. 被引量:1
  • 5King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware. Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008:1--8. 被引量:1
  • 6Banga M, Hsiao M. Novel sustained vector technique for the detection of hardware trojans. Proceedings of 22nd International Conference on VLSI design, 2009 : 327--332. 被引量:1
  • 7Lamech C, Rad R, Tehranipoor M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting trojans and methods for achieving the requied detection sensitivities. IEEE Transactions on Information Forensics and Security, 2011, 6 (3): 142--155. 被引量:1
  • 8Tehranipoor M,Koushanfar F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design&Test of Computers,2010,27(1):10-25. 被引量:1
  • 9Jin Y,Kupp N,Makris Y.Experiences in hardware Trojan design and implementation[C]∥IEEE Int Workshop HOST′2009.San Francisco:Springer,2009:50-57. 被引量:1
  • 10Wei S,Potkonjak M.Scalable hardware Trojan diagnosis[J].IEEE Transactions on VLSI Systems,2011,20(6):1049-1057. 被引量:1

引证文献13

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部