期刊文献+

基于SAE-OCSVM的伪芯片检测研究 被引量:1

Research on Counterfeit Chip Detection Based on SAE-OCSVM Framework
下载PDF
导出
摘要 针对传统芯片检测方法存在检测效率低、要求高、适用性差等问题,提出了基于电磁旁路信号和机器学习方法的伪芯片检测框架.首先,在持有正品芯片的基础上通过引入神经网络和多种特征提取方法提取特征向量,并将正样本的指令信号作为模板库;然后,对待测芯片近场电磁信号进行加窗分帧,并对每帧信号进行特征提取;最后,将特征向量输入改进核函数的一类支持向量机进行扫描式匹配,从而达到芯片检测的目的.实验结果表明,该方法能够适用于以次充好重标记类型的伪芯片检测. Aiming at the problems of traditional chip detection methods,such as low detection efficiency,high requirements and poor applicability,a chip detection framework based on the electromagnetic side channel and machine learning method is proposed.Firstly,on the basis of holding the genuine chip,the feature vector is extracted by introducing the neural network and various feature extraction methods,and the instruction signal of the positive sample is used as the template library.Then,the near-field electromagnetic signals of the chip to be tested are divided into frames,and the features of each frame are extracted.Finally,the feature vectors are input to One-Class Support Vector Machine with improved kernel function for scanning matching,so as to achieve the purpose of chip detection.The experimental results show that the proposed method can be applied to the detection of counterfeit chips that have been re-marked such as shoddy chips and fake chips.
作者 李雄伟 刘俊延 张阳 陈开颜 刘林云 LI Xiongwei;LIU Junyan;ZHANG Yang;CHEN Kaiyan;LIU Linyun(Shijiazhuang Campus,Army Engineering University,Shijiazhuang 050003,China)
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2022年第2期117-124,共8页 Journal of Hunan University:Natural Sciences
基金 国家自然科学基金青年基金资助项目(61602505)。
关键词 集成电路 伪芯片检测 旁路分析 自动编码器 一类支持向量机 integrated circuit counterfeit chip detection side channel analysis auto encoder One-Class Sup-port Vector Machine
  • 相关文献

参考文献7

二级参考文献44

  • 1MANAGARD S. Calculation and simulation of the susceptibility of cryptographic devices to power-analysis attacks[D]. Graz : Graz University of Technology, 2003 : 27- 49. 被引量:1
  • 2TILLICH S. Evaluation of side-channel attack resistivity with rapid prototyping [D]. Graz: Graz University of Technology, 2003:40-46. 被引量:1
  • 3URM, IAIK,KURLD. CARD-RM1-D6.1,2005. Modeling simulation of SCA effects [ R/OL]//[ 2005-06-01 ] http:// www. seard-pro.iect. org. 被引量:1
  • 4IA H, MARKETTOS A T, MOORE S. Security evaluation against electromagnetic analysis at design time[C]// Cryptographic Hardware and Embedded Systems-CHES 2005. Berlin/Heidelberg: Springer Verlag, 2005:280-292. 被引量:1
  • 5RABAEY J M. Digital integrated circuits[M]. Englewood Cliffs, NJ: Prentice Hall, 1996:67-69. 被引量:1
  • 6MURESAN R, GREGORI S. Protection circuit against differential power analysis attacks for smart cards[J]. IEEE Transactions on Computers,2008,47(11):1540-1549. 被引量:1
  • 7POPP T, MANGARD S, OSWALD E. Power analysis attacks and countermeasures [J]. IEEE Transaction on Design Test of Computers, 2007, 24(6): 535-543. 被引量:1
  • 8ALIOTO M, POLI M, ROCCHI S. A general model for differential power analysis attacks to static logic cireuits[C]// Proceedings of ISCAS 2008. Berlin/Heidelberg:Springer Verlag, 2008:3346-3349. 被引量:1
  • 9IZU T, TAKAGI T. A fast parallel elliptic curve multiplication resistant against side channel attacks [C]//Public Key Cryptography. Berlin/Heidelberg:Springer Verlag,2002:280 -296. 被引量:1
  • 10Rubinstein R, Bruckstein A M, Elad M. Dictionaries for sparse representation modeling[J]. Proceedings of IEEE, 2010, 98(6) : 1045 - 1057. 被引量:1

共引文献24

同被引文献15

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部