硬件木马综述

上传人:jiups****uk12 文档编号:38371102 上传时间:2018-05-01 格式:PDF 页数:6 大小:531.52KB
返回 下载 相关 举报
硬件木马综述_第1页
第1页 / 共6页
硬件木马综述_第2页
第2页 / 共6页
硬件木马综述_第3页
第3页 / 共6页
硬件木马综述_第4页
第4页 / 共6页
硬件木马综述_第5页
第5页 / 共6页
点击查看更多>>
资源描述

《硬件木马综述》由会员分享,可在线阅读,更多相关《硬件木马综述(6页珍藏版)》请在金锄头文库上搜索。

1、硬件木马综述刘华锋1 , 2罗宏伟2 .王力纬21 . 华南理工大学电子与信息学院,广州5 1 0 6 4 02 . 工业和信息化部电子第五研究所电子元器件可靠性物理及其应用技术国家级重点实验室,广州5 1 0 6 4 0摘要: 集成电路在设计或制造过程中会受到硬件木马的攻击,使芯片与硬件的安全性受到威胁。硬件木马技术逐渐受到重视,已成为当今一个新的研究热点。文章介绍了硬件木马的概念,对三种主要的硬件木马分类方法进行了分析;着重探讨了硬件木马的检测方法。对检测方法存在的 问题与面临的挑战进行了分析,指出基于旁路信号分析的硬件木马检测方法是当前最主要的一种检测方法。硬件木马; 集成电路; 芯片安

2、全; 检测方法T N 4 0 6A1 0 0 4 - 3 3 6 5 ( 2 0 1 1 ) 0 5 - 0 7 0 9 - 0 5S u r v e y o n H a r d w a r e T r o j a n H o r s e L I U H u a f e n gL U O H o n g w e iW A N G L i w e i2 0 1 1 - 0 1 - 1 12 0 1 1 - 0 3 - 3 03 硬件木马的分类示为原始的A E S 1 A G R A W A L D , B A K T I R S , K A R A K O Y U N L U D , e t a

3、 l . T r o j a n d e t e c t i o n u s i n g I C f i n g e r p r i n t i n g C / /2 0 0 7 I E E E S y m p S e c u r i t y a n d P r i v a c y . O a k l a n d , C A ,U S A . 2 0 0 7 : 2 9 6 - 3 1 0 . 2 W O L F F F , P A P A C H R I S T O U C , B H U N I A S , e t a l .T o w a r d s T r o j a n - f r

4、e e t r u s t e d I C s : p r o b l e m a n a l y s i s a n d d e t e c t i o n s c h e m e C / / A u t o m a t i o n a n d T e s t i n E ur o p e C o n f . M u n i c h , G e r m a n y . 2 0 0 8 : 1 3 6 2 - 1 3 6 5 . 3 B A N G A M , H S I A O M . A n o v e l s u s t a i n e d v e c t o r t e c h n i

5、 q u e f o r t h e d e t e c t i o n o f h a r d w a r e T r o j a n s C / /I n t C o n f V L S I D e s i g n . N e w D e l h i , I n d i a . 2 0 0 9 : 3 2 7 -3 3 2 . 4 W A N G X , T E H R A N I P O O R M , P L U S Q U E I L I C J . D e t e c t i n g m a l i c i o u s i n c l u s i o n s i n s e c u

6、 r e h a r d w a r e : c h a l l e n g e s a n d s o l u t i o n s C / / I E E E I n t W o r k s h o p H O S T . A n a h e i m , C A , U S A . 2 0 0 8 : 1 5 - 1 9 . 5 T E H R A N I P O O R M , K O U S H A N F A R F . A s u r v e y o f h a r d w a r e T r o j a n t a x o n o m y a n d d e t e c t i o

7、 n J . I E E E D e s i g n 工业和信息化部电子第五研究所电子元 器件可靠性物理及其应用技术国家级重点实验室,广州510640), 罗宏伟,王力纬,LUO Hongwei,WANG Liwei(工业和信息化部电子第五研究所电子元器件可靠性物理及其应用技术国家级重点实验室,广州 ,510640) 刊名:微电子学 英文刊名:Microelectronics 年,卷(期):2011,41(5)参考文献(22条)参考文献(22条)1.AGRAWAL D;BAKTIR S;KARAKOYUNLU D Trojan detection using IC fingerprinting

8、 20072.WOLFF F;PAPACHRISTOU C;BHUNIA S Towards Trojan-free trusted ICs:problem analysis and detection scheme 20083.BANGA M;HSIAO M A novel sustained vector technique for the detection of hardware Trojans 20094.WANG X;TEHRANIPOOR M;PLUSQUEILIC J Detecting malicious inclusions in secure hardware:chall

9、enges and solutions20085.TEHRANIPOOR M;KOUSHANFAR F A survey of hardware Trojan taxonomy and detection 2010(01)6.DARPA Trust in integrated circuits (TIC)-proposer information pamp 20087.RAJAT S C;SEETHARAM N;SWARUP 13 Hardware Trojan:threats and emerging solutions 20098.JIN Y;KUPP N;MAKRIS Y Experie

10、nces in hardware Trojan design and implementation 20099.JIN Y;MAKRIS Y Hardware Trojan detection using path delay fingerprint 200810.ALKABANI Y;KOUSHANFAR F Consistency-based characterization for IC Trojan detection 200911.TEHRANIPOOR M;SUNAR B Hardware Trojan horses 201012.SALMANI H;TEHRANIPOOR M;P

11、LUSQUEILIC J New design strategy for improving hardware Trojan detection and reducingTrojan activation time 200913.BANGA M;MICHAEL S H A region based approach for the identification of hardware Trojans 200814.CHAKRABORTY R S;PAUL S;BHUNIA S Ondemand transparency for improving hardware Trojan detecta

12、bility 200815.RAD R M;WANG X X;MOHAMMAD T Power supply signal calibration techniques for improving detection resolution tohardware Trojans 200816.KING S T;TUCEK J;COZZIE A Designing and implementing malicious hardware 200817.ALKABANI Y;KOUSHANFAR F Active hardware metering for intellectual property

13、protection and security 200718.SANNO B Detecting hardware Trojans 200919.CHAKRABORTY R S;WOL F;PAUL S MERO:a statistical approach for hardware Trojan detection 200920.LI J;LACH J At-speed delay characterization for IC authentication and Trojan horse detection 200821.NARASIMHAN S;DUD D;WOLFF F Multiple-parameter side-channel analysis:a non-invasive hardware Trojan detectionapproach 201022.AARESTAD J;ACHARYYA D;RED R Detecting Trojans through leakage current analysis using multiple supply pad IDDQs2010本文链接:http:/

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 行业资料 > 其它行业文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号