首页 | 本学科首页   官方微博 | 高级检索  
     

基于可满足性无关项的硬件木马设计与检测
作者姓名:武玲娟  朱嘉诚  唐时博  谭静  胡伟
作者单位:1. 西北工业大学网络空间安全学院,陕西 西安710072;2. 华中农业大学信息学院,湖北 武汉430070
基金项目:国家自然科学基金(62074131);湖北省自然科学基金(2020CFB190)。
摘    要:硬件木马是集成电路中隐含的恶意设计修改,被激活后可用于发起高效的底层攻击。由此,展示了一种新的利用可满足性无关项的轻量级高隐蔽性硬件木马安全威胁。该木马设计方法将轻量级木马设计隐藏于电路正常工作条件下无法覆盖到的可满足性无关项中,使插入木马后的电路设计与原始设计完全功能等价。攻击者只需利用简单的故障注入攻击手段即可激活木马。基于1024位RSA密码核的实验结果显示,所给出的木马设计能够逃避逻辑综合优化,通过故障注入攻击能够有效恢复RSA密码核的私钥。在此基础上,提出了一种能够有效检测该高隐蔽性木马设计的防御手段。

关 键 词:硬件安全  硬件木马  可满足性无关项  故障注入  木马检测  

Design and detection of hardware Trojan based on satisfiability don't cares
Authors:WU Lingjuan  ZHU Jiacheng  TANG Shibo  TAN Jing  HU Wei
Affiliation:1. School of Cyber Security, Northwestern Polytechnical University, Xi’an 710072, China;2. College of Informatics, Huazhong Agricultural University, Wuhan 430070, China
Abstract:Hardware Trojans are intended malicious design modifications to integrated circuits,which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization,and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.
Keywords:hardware security  hardware Trojan  satisfiability don't care  fault injection  Trojan detection
本文献已被 维普 等数据库收录!
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号