【24h】

A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods

机译:使用验证方法检测设计级硬件木马的过程

获取原文
获取原文并翻译 | 示例

摘要

Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have been shown to serve for Trojan detection. In this paper, we propose a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems. We outline the fundamental basics of verification methods and go then into the details of each step in the process. We identify assets and attackers, and outline which methods are suited to defend against which type of attack.
机译:过去几年来,硬件木马已成为一种严重的威胁。已经发布了几种检测可能的硬件特洛伊木马的方法,其中大多数旨在在制造后测试期间进行检测。但是,硬件木马更有可能在设计级别插入,因为这样做所需的资源比制造时要少得多。在设计级别,已证明验证方法可用于木马检测。在本文中,我们提出了一种在硬件木马检测中利用验证方法的设计过程,该过程可以集成到嵌入式系统的最新设计流程中。我们概述了验证方法的基本基础,然后详细介绍了过程中的每个步骤。我们确定资产和攻击者,并概述适合防御哪种类型攻击的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号