检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张荣 王丽娟 于宗光 ZHANG Rong;WANG Li-juan;YU Zong-guang(The Fifty-eighth Research Institute of China Electronic Technology Group Corporation,Wuxi 214063,China)
机构地区:[1]中国电子科技集团公司第五十八研究所,江苏无锡214063
出 处:《电子设计工程》2020年第15期23-28,共6页Electronic Design Engineering
摘 要:针对集成电路设计时引入第三方IP软核,极易存在安全威胁的问题,现有的功能测试和搜索方法无法实现快速检测。本文提出一种基于结构特征的IP软核木马检测方法,并通过软件实现快速结构搜索和信号安全性分析。首先对典型的木马触发模块结构特征进行分析,用软件实现IP软核快速结构搜索,提取可疑的信号,然后对信号进行路径追踪,最后对信号路径进行分析是否有非法路径或功能篡改。在AES电路上实验结果表明,通过分析触发模块的结构特征和电路特征,本方法能够快速识别指定触发模型的硬件木马。The insertion of third-party IP cores into integrated circuits in design phase,is easily leading into security threats.The existing functional test methods and searching method cannot achieve fast detection.This paper proposes an IP core Trojan detection method based on structural features,and implements fast structure searching and signal security analysis through software programming.Firstly,the structural features of typical Trojan trigger modules are analyzed,and the programming structure searching method is used to extract suspicious signals in IP soft cores.Then using path tracking method to findthe signal’s path.Finally,analyzing the signal path to see whether there is an illegal path or functional tampering.Experimental results on the AES circuit show that by analyzing the structural features and circuit features of the trigger module,this method can quickly identify the hardware Trojan that specifies the trigger model.
分 类 号:TN407[电子电信—微电子学与固体电子学]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.118.210.233