电路工作模式下惰性节点的确定
发布时间:2018-08-16 09:16
【摘要】:集成电路设计和制造的全球化趋势使得木马电路可以在集成电路设计制造的任何阶段被插入,这引发了对硬件安全的广泛关注.从防御者的角度出发,木马电路在宿主电路使用过程中绝大多数时间是静默无害的,但是一旦被激活就会造成如信息泄露、功能异常或系统崩溃等严重危害;从攻击者的角度出发,避免木马电路被"误触发"是其最重要的一个设计目标之一.普遍认为,电路中那些具有较低状态翻转概率的惰性节点最有可能成为木马电路的插入点.因此目前检测的主要手段之一是试图寻找到这些惰性点,以便有针对性地尝试以激活木马电路.然而,目前的方法仅专注于寻找被测电路在测试模式下的惰性点.提出了一种寻找被测电路在工作模式下的惰性点的方法.从攻击者的角度出发,两者的交集将是木马电路的最佳插入点——可以较好地避免其插入的木马电路在宿主电路的测试阶段以及试运行阶段被"误触发".因此从防御者的角度出发,找到测试模式和工作模式下共有的惰性节点并对其进行检测,有助于有效提高检测效率.
[Abstract]:The globalization of integrated circuit design and manufacture makes Trojan circuit can be inserted at any stage of IC design and manufacture, which has aroused widespread concern about hardware security. From the point of view of the defender, the Trojan circuit is silent and harmless in the course of the host circuit use, but once activated, it will cause serious harm such as information leakage, abnormal function or system collapse. From the point of view of the attacker, one of the most important design goals is to avoid the misfiring of Trojan circuit. It is generally believed that those inert nodes with lower state turnover probability are most likely to be the insertion point of Trojan circuit. Therefore, one of the main methods of detection is to try to find these inert points in order to activate Trojan circuit. However, the current method only focuses on finding the lazy point of the circuit under test mode. This paper presents a method to find the inert point of the circuit under operation mode. From the point of view of the attacker, the intersection of the two will be the best insertion point of the Trojan circuit, which can avoid the misfiring of the Trojan circuit in the test stage and the trial stage of the host circuit. Therefore, from the point of view of the defender, finding and detecting the common inert nodes in test mode and working mode is helpful to improve the efficiency of detection.
【作者单位】: 重庆大学计算机学院;信息物理社会可信服务计算教育部重点实验室(重庆大学);
【基金】:国家自然科学基金项目(61472052) 国家“八六三”高技术研究发展计划基金项目(2015AA015304,2013AA013202)~~
【分类号】:TN407
,
本文编号:2185548
[Abstract]:The globalization of integrated circuit design and manufacture makes Trojan circuit can be inserted at any stage of IC design and manufacture, which has aroused widespread concern about hardware security. From the point of view of the defender, the Trojan circuit is silent and harmless in the course of the host circuit use, but once activated, it will cause serious harm such as information leakage, abnormal function or system collapse. From the point of view of the attacker, one of the most important design goals is to avoid the misfiring of Trojan circuit. It is generally believed that those inert nodes with lower state turnover probability are most likely to be the insertion point of Trojan circuit. Therefore, one of the main methods of detection is to try to find these inert points in order to activate Trojan circuit. However, the current method only focuses on finding the lazy point of the circuit under test mode. This paper presents a method to find the inert point of the circuit under operation mode. From the point of view of the attacker, the intersection of the two will be the best insertion point of the Trojan circuit, which can avoid the misfiring of the Trojan circuit in the test stage and the trial stage of the host circuit. Therefore, from the point of view of the defender, finding and detecting the common inert nodes in test mode and working mode is helpful to improve the efficiency of detection.
【作者单位】: 重庆大学计算机学院;信息物理社会可信服务计算教育部重点实验室(重庆大学);
【基金】:国家自然科学基金项目(61472052) 国家“八六三”高技术研究发展计划基金项目(2015AA015304,2013AA013202)~~
【分类号】:TN407
,
本文编号:2185548
本文链接:https://www.wllwen.com/kejilunwen/dianzigongchenglunwen/2185548.html