检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张洋 刘畅[1] 李少青[1] ZHANG Yang;LIU Chang;LI Shaoqing(Key Laboratory of Advanced Microprocessor Chips and Systems,School of Computer,National University of Defense Technology,Changsha 410071,Hunan,China)
机构地区:[1]国防科技大学计算机学院先进微处理器芯片与系统重点实验室,湖南长沙410071
出 处:《计算机工程》2024年第7期164-173,共10页Computer Engineering
基 金:国家自然科学基金(61832018)。
摘 要:随着全球化的不断深入,第三方知识产权(IP)核应用越来越广泛。随着硬件木马攻击技术逐渐成熟,使得在芯片设计阶段植入硬件木马成为可能。因此,在芯片设计过程中面临IP核被植入木马的严重威胁,现有研究所提的硬件木马检测方法具有依赖黄金参考电路、需要完备的测试向量、大量的样本进行学习等特征。面向IP核的硬件木马检测需求,提出一种基于可控制性度量的图神经网络检测方法。该方法以门级网表作为输入,首先以可控制性值为指导,得到可疑的门节点,用于缩小搜索范围;然后利用可疑门节点生成对应的子图,利用图卷积神经网络从子图中提取特征,实现对子图的分类和检测,最终识别硬件木马。实验结果表明,该方法无须测试激励和黄金模型,利用硬件木马的隐蔽特性与结构特征相结合的方法提升硬件木马的检测准确率,平均真阳率为100%,假阳率为0.75%,在保证较高真阳率的同时可有效降低假阳率,达到较好的检测效果。With the continuous increase in globalization,third-party Intellectual Property(IP)core applications have become increasingly widespread.The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip design process,posing a serious threat to chip design security.Hardware Trojan detection methods proposed in the current study have the following drawbacks:they rely on golden reference circuits,require complete test patterns,and require a large number of samples for learning.This study proposes a graph neural network detection method based on controllability metrics for the hardware Trojan detection requirements of IP cores.This method uses a gate-level netlist as the input and first uses controllability values as guidance to obtain suspicious gate nodes to narrow the search range.Subsequently,the suspicious gate nodes are generated into corresponding subgraphs,and the graph convolutional neural network is used to extract features from the subgraphs.Thus,it detects the subgraphs and ultimately identifies the existence of hardware Trojans.The experimental results demonstrate that the proposed method does not require testing patterns and golden models.By combining the hidden characteristics and structural features of hardware Trojans,the detection accuracy is improved.The average True Positive Rate(TPR)and False Positive Rate(FPR)are 100% and 0.75%,respectively.Additionally,it effectively reduces the FPR and achieve satisfactory detection results while ensuring a high TPR.
关 键 词:知识产权核 硬件木马 可控制性度量 子图 图卷积神经网络
分 类 号:TP391.4[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49