信息网络安全
信息網絡安全
신식망락안전
NETINFO SECURITY
2014年
7期
7-11
,共5页
魏佩%李少青%陈吉华%倪林
魏珮%李少青%陳吉華%倪林
위패%리소청%진길화%예림
芯片安全%硬件木马%旁路分析%扫描电压%AES
芯片安全%硬件木馬%徬路分析%掃描電壓%AES
심편안전%경건목마%방로분석%소묘전압%AES
chip-security%hardware trojan%side-channel analysis%scanning voltage%AES
硬件木马是一种微小而隐蔽的恶意电路,它隐藏在目标芯片中,在一定条件下实施对目标芯片输入输出节点状态或功能的恶意修改。随着集成电路设计生产全球化的不断加剧,芯片设计与生产环节的分离增加了芯片被植入硬件木马的可能性,给芯片的安全性与可靠性带来了极大的威胁。因此,如何检测被测芯片是否含有硬件木马,确保集成电路芯片安全变得日益重要。文章基于40nm 工艺库下,对高级加密标准 AES 算法的网表中设计植入相对于无木马AES 电路大小为2.7%的信息窃取型硬件木马,并与无木马 AES 电路作为 Golden 参考模型进行对比,通过分析 PVT(工艺、电压、温度)参数中不同工作电压对电路旁路功耗信息影响的规律,发现由工作电压抖动而引起的功耗噪声可以淹没由硬件木马的植入而引入功耗信息,进而降低硬件木马检测效率,在此基础上文章提出一种基于随机扫描电压叠加的硬件木马旁路功耗信息的显化方法,规避了在常规硬件木马检测时电压波动对硬件木马的检测影响,实现对硬件木马的检测。
硬件木馬是一種微小而隱蔽的噁意電路,它隱藏在目標芯片中,在一定條件下實施對目標芯片輸入輸齣節點狀態或功能的噁意脩改。隨著集成電路設計生產全毬化的不斷加劇,芯片設計與生產環節的分離增加瞭芯片被植入硬件木馬的可能性,給芯片的安全性與可靠性帶來瞭極大的威脅。因此,如何檢測被測芯片是否含有硬件木馬,確保集成電路芯片安全變得日益重要。文章基于40nm 工藝庫下,對高級加密標準 AES 算法的網錶中設計植入相對于無木馬AES 電路大小為2.7%的信息竊取型硬件木馬,併與無木馬 AES 電路作為 Golden 參攷模型進行對比,通過分析 PVT(工藝、電壓、溫度)參數中不同工作電壓對電路徬路功耗信息影響的規律,髮現由工作電壓抖動而引起的功耗譟聲可以淹沒由硬件木馬的植入而引入功耗信息,進而降低硬件木馬檢測效率,在此基礎上文章提齣一種基于隨機掃描電壓疊加的硬件木馬徬路功耗信息的顯化方法,規避瞭在常規硬件木馬檢測時電壓波動對硬件木馬的檢測影響,實現對硬件木馬的檢測。
경건목마시일충미소이은폐적악의전로,타은장재목표심편중,재일정조건하실시대목표심편수입수출절점상태혹공능적악의수개。수착집성전로설계생산전구화적불단가극,심편설계여생산배절적분리증가료심편피식입경건목마적가능성,급심편적안전성여가고성대래료겁대적위협。인차,여하검측피측심편시부함유경건목마,학보집성전로심편안전변득일익중요。문장기우40nm 공예고하,대고급가밀표준 AES 산법적망표중설계식입상대우무목마AES 전로대소위2.7%적신식절취형경건목마,병여무목마 AES 전로작위 Golden 삼고모형진행대비,통과분석 PVT(공예、전압、온도)삼수중불동공작전압대전로방로공모신식영향적규률,발현유공작전압두동이인기적공모조성가이엄몰유경건목마적식입이인입공모신식,진이강저경건목마검측효솔,재차기출상문장제출일충기우수궤소묘전압첩가적경건목마방로공모신식적현화방법,규피료재상규경건목마검측시전압파동대경건목마적검측영향,실현대경건목마적검측。
Hardware Trojan is a malicious circuit which is so tiny and covert, masking in the chip to modify the inputs and outputs’ nodes status or function of the target chip. With the increasing globalization of the design and fabrication of integrated circuits(ICs), it makes the chips easier to be inserted Hardware Trojans due to the separation of the design and production processes, which leads to the huge threat of the ICs’ security and reliability. How to detect whether the test chip containing the Hardware Trojan to ensure safety of the integrated circuits is becoming more and more important. The authors designed a kind of theft-type Hardware Trojan in the netlist of the AES encryption algorithm based on 40-nm standard cell libraries, and the size of the Hardware Trojan was about 2.7% compared with the Golden pure AES circuit (Trojan-free), then the design was analyzed through different operating voltages of the parameter of the PVT (process & voltage & temperature), which caused the different laws of the side-channel power consumption, we have found that the verification of the side-channel power consumption caused by the implanting Hardware Trojan could be overwhelmed by the working voltage jitter, so that reduced the Hardware Trojan detection efficiency. Based on the article, we present a method to manifest the side-channel power consumption of the Hardware Trojan based on the random scanning voltage, which circumvent the effects of the verification of side-channel power consumption due to the voltage fluctuation in the normal Hardware Trojan detection, and achieve the goal of the Hardware Trojan’s detection.