期刊文献+

针对GPS坐标篡改的硬件木马设计

The Hardware Trojan Design Aiming at Tamper with GPS Coordinates
下载PDF
导出
摘要 由于IC芯片生产和制造的分离,导致在IC芯片中容易被植入硬件木马等恶意电路。通过研究硬件木马的触发和行为机制,设计一种篡改内部信息的功能型硬件木马,以更好地说明硬件木马对IC芯片的危害。首先介绍了硬件木马的相关概念;然后以GPS主控模块为研究对象,提出了功能型硬件木马的设计思路和原理,分析了触发木马后对飞行器运动轨迹的影响;最后通过实验验证了验证了木马的有效性。 Caused by the separation of production and manufacturing of IC chips,hardware Trojans and others malicious circuit are easy to be implanted into the IC chip. By Through studying Trojan trigger and action mechanism,design a kind of hardware Trojans that can tamper with the internal information of functional, to illustrate the hardware Trojan harm to IC chips. First, this paper introduces the concepts of hardware Trojan;Master GPS control module as the research object,and puts forward the design thinking and principle of functional hardware Trojans, analyses the haedware Trojan that how to influence the vehicle trajectory;Finally, verifies the effectiveness of the hardware Trojan
出处 《系统仿真技术》 2016年第2期134-139,共6页 System Simulation Technology
关键词 硬件木马 触发机制 行为机制 速度检测 累积误差 hardware trojans activation mechanism behavior mechanism velocity measurement accumulative error
  • 相关文献

参考文献10

  • 1Tehranipoor M, Koushanfar F. A survey of hardware trojan taxonomy and detection [ J ]. IEEE Design & Test of Computers, 2010,27 ( l ) : 10 - 25. 被引量:1
  • 2Wang X, Tehranipoor M, PlusquellicJ. Dectecting malicious inclusions in secure hardware:challenges and solutions [ C ] // 1' IEEE International Workshop on Hardware-oriented Security and Trust ( HOST2008 ). Piscataway : IEEE Press ,2008 : 15 - 19. 被引量:1
  • 3谢方方,李雄伟,张阳,陈开颜,徐徐.基于RS232协议时隙的硬件木马设计[J].科学技术与工程,2013,21(28):8284-8287. 被引量:5
  • 4张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 5张阳,李雄伟,陈开颜,徐徐.基于故障注入的硬件木马设计与差分分析[J].华中科技大学学报(自然科学版),2014,42(4):68-71. 被引量:5
  • 6King S T, TucekJ, Cozzie A, et al. Designing and implementing malicious hardware [ A ]. Proceeding of the 1' USENIX Workshop on Large--Scale Exploits and Emergent Threats(LEET) [ C]. 2008,1 - 8. 被引量:1
  • 7Jin Y, Kuoo N, Makris Y. Experiences in hardware Trojan design and implementation [ C ] /J IEEE International Workshop on Hardware-oriented Security and Trust ( HOST2009 ). Piscataway : IEEE Press, 2009 : 50 -57. 被引量:1
  • 8倪林,李少青,马瑞聪,魏佩.硬件木马检测与防护[J].数字通信,2014,41(1):59-63. 被引量:15
  • 9Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojandetection [ J]. IEEE Transactions on Information Forensics and Security ,2011,6( 1 ) : 162 - 174. 被引量:1
  • 10纪杭辛..基于DSP的某型卫星导航计算机信息处理系统设计[D].电子科技大学,2013:

二级参考文献44

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 2Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]//1st IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscataway:IEEE Press, 2008: 15-19. 被引量:1
  • 3U S D of Defense. Defense science board task force on high performance microchip supply[DB/CD][2010-01-10]. http://www. acq. osd. mil/dsb/reports/2005-02 HPMS Report Final. pdf. 被引量:1
  • 4Adee S. The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34-39. 被引量:1
  • 5King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware [C]// Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008: 1-8. 被引量:1
  • 6Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]// Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2007: 296- 310. 被引量:1
  • 7Lin L, Burleson W, Paar C. MOLES: Malicious offchip leakage enabled by side-channels [C]//Proceed ings of the 2009 International Conference on Computer-aided Design. New York: ACM, 2009: 117-122. 被引量:1
  • 8Banga M, Hsiao M S. A region based approach for the identification of hardware trojans[C]//IEEE International Workshop on Hardware-oriented Security and Trust (HOST2008). Piscataway: IEEE Press, 2008: 40-47. 被引量:1
  • 9Chakraborty R, Paul S, Bhunia S. On-demand transparency for improving hardware trojan detectability [C]//IEEE International Workshop on Hardware oriented Security and Trust (HOST2008). Piscat-away:IEEE Press, 2008: 48-50. 被引量:1
  • 10Rad R M, Wang X, Tehranipoor M, et al. Power supply signal calibration techniques for improving detection resolution to hardware troians[C]// Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design. Piscataway: IEEE Press, 2008: 632-639. 被引量:1

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部