首页 | 本学科首页   官方微博 | 高级检索  
     

一种面向粗粒度可重构阵列的硬件木马检测算法的设计与实现
引用本文:严迎建,刘敏,邱钊洋.一种面向粗粒度可重构阵列的硬件木马检测算法的设计与实现[J].电子与信息学报,2019,41(5):1257-1264.
作者姓名:严迎建  刘敏  邱钊洋
作者单位:解放军信息工程大学 郑州 450001;解放军信息工程大学 郑州 450001;解放军信息工程大学 郑州 450001
摘    要:硬件木马检测已成为当前芯片安全领域的研究热点,现有检测算法大多面向ASIC电路和FPGA电路,且依赖于未感染硬件木马的黄金芯片,难以适应于由大规模可重构单元组成的粗粒度可重构阵列电路。因此,该文针对粗粒度可重构密码阵列的结构特点,提出基于分区和多变体逻辑指纹的硬件木马检测算法。该算法将电路划分为多个区域,采用逻辑指纹特征作为区域的标识符,通过在时空两个维度上比较分区的多变体逻辑指纹,实现了无黄金芯片的硬件木马检测和诊断。实验结果表明,所提检测算法对硬件木马检测有较高的检测成功率和较低的误判率。

关 键 词:硬件木马检测    粗粒度可重构密码阵列    逻辑指纹    多变体
收稿时间:2018-05-21

Design and Implementation of Hardware Trojan Detection Algorithm for Coarse-grained Reconfigurable Arrays
Yingjian YAN,Min LIU,Zhaoyang QIU.Design and Implementation of Hardware Trojan Detection Algorithm for Coarse-grained Reconfigurable Arrays[J].Journal of Electronics & Information Technology,2019,41(5):1257-1264.
Authors:Yingjian YAN  Min LIU  Zhaoyang QIU
Affiliation:The PLA’s Information Engineering University, Zhengzhou 450001, China
Abstract:Hardware Trojan horse detection has become a hot research topic in the field of chip security. Most existing detection algorithms are oriented to ASIC circuits and FPGA circuits, and rely on golden chips that are not infected with hardware Trojan horses, which are difficult to adapt to the coarse-grained reconfigurable array consisting of large-scale reconfigurable cells. Therefore, aiming at the structural characteristics of Coarse-grained reconfigurable cryptographic logical arrays, a hardware Trojan horse detection algorithm based on partitioned and multiple variants logic fingerprints is proposed. The algorithm divides the circuit into multiple regions, adopts the logical fingerprint feature as the identifier of the region, and realizes the hardware Trojan detection and diagnosis without golden chip by comparing the multiple variant logic fingerprints of the regions in both dimensions of space and time. Experimental results show that the proposed detection algorithm has high detection success rate and low misjudgment rate for hardware Trojan detection.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号