首页 | 官方网站   微博 | 高级检索  
     

硬件木马技术研究综述
引用本文:牛小鹏,李清宝,王 炜,张 丹.硬件木马技术研究综述[J].信息工程大学学报,2012,13(6):740-748.
作者姓名:牛小鹏  李清宝  王 炜  张 丹
作者单位:1. 信息工程大学网络空间安全学院,河南郑州,450002
2. 河南郑州供电公司,河南郑州,450000
基金项目:国家863计划资助项目
摘    要:集成电路芯片在设计、制造及使用过程中都可能会被植入硬件木马,电子设备的安全受到极大威胁。近年来,硬件木马的设计和检测技术逐渐受到重视,已成为研究热点。首先分析了硬件木马的特性和概念,然后在介绍硬件木马主要分类方法的基础上,提出了用于评价硬件木马隐藏特性的功能分散粒度、激活概率和阈值功耗等衡量指标。探讨了几种典型硬件木马的设计思路和检测方法,分析了硬件木马检测方法存在的问题与面临的挑战,最后对硬件木马相关技术的研究与发展提出建议。

关 键 词:集成电路  硬件木马  旁路型木马  硬件木马检测  状态驱动

Survey on the Hardware Trojan Technologies
NIU Xiao-peng , LI Qing-bao , WANG Wei , ZHANG Dan.Survey on the Hardware Trojan Technologies[J].Journal of Information Engineering University,2012,13(6):740-748.
Authors:NIU Xiao-peng  LI Qing-bao  WANG Wei  ZHANG Dan
Affiliation:1.Institute of Cyberspace Security,Information Engineering University,Zhengzhou 450002,China; 2.Henan Zhengzhou Power Supply Company,Zhengzhou 450000,China)
Abstract:Integrated circuits are vulnerable to hardware Trojan horse either in design or during fabrication, which threatens the security of key equipment hardware. The hardware Trojan horse technology has raised serious concerns and become a new research focus. The characteristics of hardware Trojan horse were described after studying kinds of horse, and the classification of hardware Trojan horse was analyzed. Then, the disperation of function, power consumption and activation probability were proposed to study the hiding property of hardware Trojan horse. The state of art of hardware Trojan horse design and detection technology were reviewed, and problems with detection methods and major challenge to be addressed in future researches were also discussed. Last, recommendations for future research on hardware Trojan horse were proposed.
Keywords:integrated circuits chip  hardware Trojan horse  side channel horse  detection of hardware Trojan  state drive
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《信息工程大学学报》浏览原始摘要信息
点击此处可从《信息工程大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号