东南大学学报(自然科学版)
東南大學學報(自然科學版)
동남대학학보(자연과학판)
JOURNAL OF SOUTHEAST UNIVERSITY
2014年
3期
457-461
,共5页
薛明富%胡爱群%刘威%王有东
薛明富%鬍愛群%劉威%王有東
설명부%호애군%류위%왕유동
硬件木马检测%硬件安全%信息安全%子空间域
硬件木馬檢測%硬件安全%信息安全%子空間域
경건목마검측%경건안전%신식안전%자공간역
hardware Trojan detection%hardware security%information security%subspace domain
为了解决制造变异和噪声对已有硬件木马检测方法的挑战和干扰,提出了一种新的微弱木马信号检测技术,能够在较大的制造变异和噪声的背景下提取出木马特征信号。首先,将木马检测问题建模为特征提取模型,然后提出了一个基于时域约束估计器和主成分投影的统一子空间木马检测方法。并通过特定的子空间投影或重构信号分析,证实弱小的木马信号可以与各种噪声和干扰区分开来。该方法为已有的硬件木马检测方法提供了一种通用的消除制造变异和噪声影响的方法。设计实现了2个时序硬件木马,在ISCAS89基准电路上进行了仿真实验验证,并在FPGA上进行了硬件实物验证,实验结果均表明了所提方法的有效性和高检测精度。
為瞭解決製造變異和譟聲對已有硬件木馬檢測方法的挑戰和榦擾,提齣瞭一種新的微弱木馬信號檢測技術,能夠在較大的製造變異和譟聲的揹景下提取齣木馬特徵信號。首先,將木馬檢測問題建模為特徵提取模型,然後提齣瞭一箇基于時域約束估計器和主成分投影的統一子空間木馬檢測方法。併通過特定的子空間投影或重構信號分析,證實弱小的木馬信號可以與各種譟聲和榦擾區分開來。該方法為已有的硬件木馬檢測方法提供瞭一種通用的消除製造變異和譟聲影響的方法。設計實現瞭2箇時序硬件木馬,在ISCAS89基準電路上進行瞭倣真實驗驗證,併在FPGA上進行瞭硬件實物驗證,實驗結果均錶明瞭所提方法的有效性和高檢測精度。
위료해결제조변이화조성대이유경건목마검측방법적도전화간우,제출료일충신적미약목마신호검측기술,능구재교대적제조변이화조성적배경하제취출목마특정신호。수선,장목마검측문제건모위특정제취모형,연후제출료일개기우시역약속고계기화주성분투영적통일자공간목마검측방법。병통과특정적자공간투영혹중구신호분석,증실약소적목마신호가이여각충조성화간우구분개래。해방법위이유적경건목마검측방법제공료일충통용적소제제조변이화조성영향적방법。설계실현료2개시서경건목마,재ISCAS89기준전로상진행료방진실험험증,병재FPGA상진행료경건실물험증,실험결과균표명료소제방법적유효성화고검측정도。
In order to eliminate the challenge and interference of the process variation and noises on existing hardware Trojan detection methods,a novel hardware Trojan detection technique is presen-ted,which can detect tiny hardware Trojan characteristics under large process variation and back-ground noises.First,the hardware Trojan detection problem is mathematically formulated as a fea-ture extraction model.Then,a unified subspace hardware Trojan detection technique is proposed based on time domain constrained estimator and principal component projection.It is proved that the weak hardware Trojan signal can be distinguished from various noise sources through particular sub-space projections or reconstructed clean signal analysis.The proposed technique provides a general method for related works to eliminate the impact of process variations and noises.Two sequential hardware Trojans are designed and implemented.Both simulation experiments on ISCAS89 bench-mark circuits and hardware validations on FPGA (field programmable gate array)boards show the effectiveness and high sensitivity of the proposed hardware Trojan detection technique.