检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张艺伦 严迎建[1] 李军伟[1] Zhang Yilun;Yan Yingjian;Li Junwei(Information Engineering University,Zhengzhou 450001,Henan,China)
机构地区:[1]信息工程大学
出 处:《计算机应用与软件》2019年第12期321-328,共8页Computer Applications and Software
摘 要:为了进一步加强基于逻辑加密的硬件木马防护技术,针对稀有节点筛选与基于逻辑加密的硬件木马防护方法,提出基于稀有度的指标检测潜在的触发器节点。结合树形加密结构提出改进型逻辑加密技术,从而能够减小木马节点的误判率,有效防止硬件木马插入并提高对可满足性攻击的防护能力。通过对典型电路的实验分析,该方法可以有效提高对潜在触发器节点的筛选效率,在保证消除稀有节点的前提下进一步提升安全性。In order to further strengthen the hardware Trojan protection technology based on logic encryption,this paper proposes an index based on rarity so as to detect potential trigger nodes aiming at the rare node screening and the protection method of hardware Trojan based on logical encryption.With tree-encrypted structure,we presented an improved logic encryption technology so as to reduce the false positive rate of Trojan nodes detection,effectively prevent hardware Trojan insertion and improve the security performance of satisfiability attacks.Through the experimental analysis of typical circuits,this method can effectively improve the screening efficiency of potential trigger nodes,and further improve security under the premise of eliminating rare nodes.
关 键 词:硬件木马 稀有度 逻辑加密 树形加密结构 可满足性攻击
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:13.59.149.79