首页 | 本学科首页   官方微博 | 高级检索  
     

基于探索式分区和测试向量生成的硬件木马检测方法
引用本文:薛明富,胡爱群,王箭.基于探索式分区和测试向量生成的硬件木马检测方法[J].电子学报,2016,44(5):1132-1138.
作者姓名:薛明富  胡爱群  王箭
作者单位:1. 南京航空航天大学计算机科学与技术学院, 江苏南京 210016; 2. 东南大学信息科学与工程学院, 江苏南京 210096; 3. 中国民航大学中国民航信息技术科研基地, 天津 300300; 4. 软件新技术与产业化协同创新中心, 江苏南京 210023
基金项目:江苏省自然科学基金青年基金(No.BK20150758);中国博士后科学基金面上资助(No.2014M561644);江苏省博士后基金科研资助(No.1402034C);中国民航信息技术科研基地开放课题基金(No.CAAC-ITRB-201405);中央高校基本科研业务费专项资金资助(NS2016096)
摘    要:本文提出基于分区和最优测试向量生成的硬件木马检测方法.首先,采用基于扫描细胞分布的分区算法将电路划分为多个区域.然后,提出测试向量重组算法,对各区域依据其自身结构生成近似最优的测试向量.最后,进行分区激活和功耗分析以检测木马,并采用信号校正技术消减制造变异和噪声的影响.优点是成倍提高了检测精度,克服了制造变异的影响,解决了面对大电路的扩展性问题,并可以定位木马.在基准电路上的验证实验表明检测性能有较大的提升.

关 键 词:硬件安全  硬件木马检测  探索式分区  最优测试向量生成  
收稿时间:2014-10-23

A Novel Hardware Trojan Detection Technique Using Heuristic Partition and Test Pattern Generation
XUE Ming-fu,HU Ai-qun,WANG Jian.A Novel Hardware Trojan Detection Technique Using Heuristic Partition and Test Pattern Generation[J].Acta Electronica Sinica,2016,44(5):1132-1138.
Authors:XUE Ming-fu  HU Ai-qun  WANG Jian
Affiliation:1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China; 2. School of Information Science and Engineering, Southeast University, Nanjing, Jiangsu 210096, China; 3. Information Technology Research Base of Civil Aviation Administration of China, Civil Aviation University of China, Tianjin 300300, China; 4. Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, Jiangsu 210023, China
Abstract:A novel hardware Trojan detection method based on heuristic partition and optimal test pattern generation is proposed.First,we use a scan cell distribution based heuristic partition to divide the circuit into regions.Then,we propose a test vector ordering algorithm to generate near-optimal test patterns based on the circuit’s structure.Lastly,we activate each region separately and perform localized IDDT analysis to detect hardware Trojans while a signal calibration technique is used to eliminate the effect of process variations and noises.The benefits of this approach are that it can magnify detection sensitivity,eliminate the effects of process variations and noises,ensure the scalability of hardware Trojan detection facing large scale ICs,and determine Trojan’s location.We evaluate our approach on benchmark circuits and the experiment results show that the detection sensitivity is greatly improved.
Keywords:hardware security  hardware Trojan detection  heuristic partition  optimal test pattern generation
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号