天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當前位置:主頁 > 科技論文 > 電子信息論文 >

基于提高觸發(fā)效率的硬件木馬檢測方法研究

發(fā)布時間:2018-12-12 21:22
【摘要】:硬件木馬是對集成電路中添加的惡意模塊的統(tǒng)稱,其目的是使集成電路在特定條件下泄露信息或不能正常工作。集成電路由于自身設計和制造的特點很容易被嵌入硬件木馬,例如設計中使用不可信的IP核、EDA工具、庫單元,或是制造時送到不可信的代工廠,都有可能引入硬件木馬到集成電路中。集成電路的應用涉及到國家安全、通信、金融等重要領域的所有關鍵設備。如果嵌入硬件木馬的集成電路被應用到這些領域可能會引起災難性后果,所以確保集成電路中不含有硬件木馬是十分重要的。為了解決這一問題,本文對如何快速、高效地檢測制造階段嵌入的數(shù)字型硬件木馬進行了研究。本文首先對硬件木馬的觸發(fā)模型進行分析,得出稀有邏輯值出現(xiàn)概率小和內部節(jié)點可控性差是制約硬件木馬被觸發(fā)的兩個關鍵因素。在此基礎上,本文提出一種提高硬件木馬活性的觸發(fā)方案:利用集成電路的固有掃描鏈結構將集成電路分割成以芯片輸入、輸出和掃描鏈為邊界的組合邏輯塊,提高內部節(jié)點的可控性;對ATPG生成的備選向量再優(yōu)化,用于提高稀有邏輯值的出現(xiàn)概率。在提高硬件木馬活性的觸發(fā)方案的基礎上,本文設計了一種同時使用邏輯測試法和旁路分析法的硬件木馬檢測方案。最后分別對硬件木馬觸發(fā)與檢測的效果進行了仿真驗證。實驗結果表明:(1)在基于邏輯測試法的檢測方案中,與常用的ATPG技術生成的測試向量相比,本文提出的提高木馬活性的觸發(fā)方案能夠以更短的時間觸發(fā)更多的硬件木馬,并且這種優(yōu)勢隨著硬件木馬觸發(fā)難度的增加而增加,最多可多觸發(fā)21.96%的組合觸發(fā)型硬件木馬并縮短97.02%的平均觸發(fā)時間,多觸發(fā)33.40%的異步計數(shù)器觸發(fā)型硬件木馬并縮短94.20%的平均觸發(fā)時間。(2)在基于旁路分析法的檢測實驗中,硬件木馬的特征可以明顯地被識別出來,并且本文提出的提高硬件木馬活性的觸發(fā)方案能夠提高硬件木馬相連節(jié)點的翻轉率,增大硬件木馬的動態(tài)功耗,使硬件木馬的功耗特征更加明顯。
[Abstract]:The hardware Trojan is a general term for the malicious modules added in the integrated circuits. The purpose of the Trojan is to make the integrated circuits leak information or not work properly under certain conditions. Integrated circuits are easily embedded in hardware Trojans because of their own design and manufacturing characteristics, such as the use of untrusted IP cores, EDA tools, library units, or delivery to untrusted consignors during manufacture. It is possible to introduce hardware Trojans into integrated circuits. The application of integrated circuits involves all the key equipment in important fields such as national security, communication, finance and so on. If integrated circuits embedded in hardware Trojans are applied to these fields, they may have disastrous consequences, so it is very important to ensure that the integrated circuits do not contain hardware Trojans. In order to solve this problem, this paper studies how to detect the digital hardware Trojan embedded in manufacturing phase quickly and efficiently. This paper first analyzes the trigger model of the hardware Trojan horse and concludes that the low probability of rare logic value and the poor controllability of internal nodes are the two key factors restricting the trigger of the hardware Trojan horse. On this basis, this paper proposes a trigger scheme to improve the activity of the hardware Trojan: the integrated circuit is divided into a combinational logic block with the input, output and scan chains as the boundary by using the inherent scan chain structure of the integrated circuit. Improving the controllability of internal nodes; The alternative vectors generated by ATPG are optimized to increase the probability of occurrence of rare logic values. Based on the trigger scheme of improving the activity of the hardware Trojan horse, this paper designs a hardware Trojan horse detection scheme using both logic test and bypass analysis. Finally, the effect of trigger and detection of hardware Trojan horse is simulated and verified. The experimental results show that: (1) in the detection scheme based on logic test, compared with the test vector generated by ATPG technology, the trigger scheme proposed in this paper can trigger more Trojan horses in a shorter time. And this advantage increases with the increase of the trigger difficulty of the hardware Trojan, and can trigger up to 21.96% of the combined trigger hardware Trojan and shorten the average trigger time of 97.02%. The multi-trigger 33.40% asynchronous counter triggers the hardware Trojan and shortens the average trigger time by 94.20%. (2) in the detection experiment based on bypass analysis, the characteristics of the hardware Trojan can be clearly recognized. Furthermore, the trigger scheme proposed in this paper can improve the turnover rate of the connected nodes of the hardware Trojan, increase the dynamic power consumption of the hardware Trojan, and make the power characteristics of the hardware Trojan more obvious.
【學位授予單位】:大連理工大學
【學位級別】:碩士
【學位授予年份】:2015
【分類號】:TP309;TN405

【參考文獻】

相關期刊論文 前2條

1 于宗光;黃偉;;中國集成電路設計產業(yè)的發(fā)展趨勢[J];半導體技術;2014年10期

2 周麗;李清寶;樊敏;趙巖;;邏輯未知PLD的安全性漏洞檢測方法[J];計算機工程;2010年18期



本文編號:2375264

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/dianzigongchenglunwen/2375264.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶ec52b***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
国产精品夜色一区二区三区不卡| 老司机精品一区二区三区| 欧美亚洲美女资源国产| 日本人妻精品有码字幕| 午夜午夜精品一区二区| 国产日韩欧美在线播放| 欧美日韩国产欧美日韩| 国产精品亚洲一区二区| 精品女同一区二区三区| 欧美激情视频一区二区三区| 精品视频一区二区三区不卡| 风间中文字幕亚洲一区| 国产精品亚洲一级av第二区| 久久人妻人人澡人人妻| 在线日本不卡一区二区| 一区二区日本一区二区欧美| 中文字幕中文字幕一区二区| 欧美大粗爽一区二区三区| 午夜福利大片亚洲一区| 久久一区内射污污内射亚洲| 国产一区麻豆水好多高潮| 日本人妻的诱惑在线观看| 国产内射一级二级三级| 亚洲第一视频少妇人妻系列| 日本成人三级在线播放| 日韩精品福利在线观看| 亚洲中文在线男人的天堂| 久久福利视频在线观看| 日本不卡在线视频你懂的| 少妇毛片一区二区三区| 日韩人妻av中文字幕| 欧美激情一区二区亚洲专区| 午夜精品成年人免费视频| 91人妻人人做人碰人人九色| 日韩夫妻午夜性生活视频| 99久久精品免费看国产高清| 黄色片一区二区在线观看| 狠狠干狠狠操在线播放| 免费在线成人激情视频| 中文字幕人妻综合一区二区| 久久亚洲国产视频三级黄|