首页> 外文会议>2014 10th International Conference on Reliability, Maintainability and Safety >Detection of information-leak hardware Trojan in AES cryptographic circuits
【24h】

Detection of information-leak hardware Trojan in AES cryptographic circuits

机译:AES加密电路中信息泄漏硬件木马的检测

获取原文
获取原文并翻译 | 示例

摘要

Modern Integrated Circuits (ICs) are becoming increasingly vulnerable to malicious inclusions and alterations (hardware Trojans) due to the globalization of semiconductor design and fabrication processes, which brings in the requirement for reliable detection of hardware Trojans made in an untrusted fabrication facility during post-manufacturing test. In this paper, we present a new method for Trojan detection that calculates temporal features of IDDT and IDDQ signals, then applies mRMR (minimum-redundancy maximum-relevance) algorithm to select feature subset, and finally uses Mahalanobis distance calculation to detect Trojan circuits. Experimental results featuring an information-leak hardware Trojan inserted into a 128-bit AES cryptographic circuits on Xilinx Spartan-3E FPGAs demonstrate the simplicity and effectiveness of the proposed approach for Trojan detection.
机译:由于半导体设计和制造工艺的全球化,现代集成电路(IC)变得越来越容易受到恶意夹杂和篡改(硬件木马)的影响,这要求在后置过程中可靠地检测在不受信任的制造设施中制造的硬件木马。制造测试。在本文中,我们提出了一种新的特洛伊木马检测方法,该方法计算IDDT和IDDQ信号的时间特征,然后应用mRMR(最小冗余最大相关性)算法选择特征子集,最后使用马氏距离计算来检测特洛伊木马电路。实验结果表明,将信息泄漏硬件Trojan插入Xilinx Spartan-3E FPGA的128位AES加密电路中,证明了所提出的木马检测方法的简单性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号