首页> 外文会议>2018 17th IEEE International Conference on Trust, Security and Privacy In Computing and Communications, 12th IEEE International Conference on Big Data Science and Engineering >Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
【24h】

Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique

机译:使用新型聚类集成技术针对不受信任的测试方构建可信的无黄金模型的硬件特洛伊木马检测框架

获取原文
获取原文并翻译 | 示例

摘要

As a result of the globalization of integrated circuits (ICs) design and fabrication process, ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works suppose that the testing stage is trustworthy. However, testing parties may conspire with malicious attackers to modify the results of hardware Trojan detection. In this paper, we propose a trusted and robust hardware Trojan detection framework against untrustworthy testing parties exploiting a novel clustering ensemble method. The proposed technique can expose the malicious modifications on Trojan detection results introduced by untrustworthy testing parties. Compared with the state-of-the-art detection methods, the proposed technique does not require fabricated golden chips or simulated golden models. The experiment results on ISCAS89 benchmark circuits show that the proposed technique can resist modifications robustly and detect hardware Trojans with decent accuracy (up to 91%).
机译:由于集成电路(IC)设计和制造工艺的全球化,IC变得容易受到硬件木马的攻击。现有的大多数硬件木马检测工作都假设测试阶段是值得信赖的。但是,测试方可能会与恶意攻击者合谋修改硬件木马检测结果。在本文中,我们提出了一种可靠且健壮的硬件Trojan检测框架,该框架针对不可信的测试方,利用一种新颖的聚类集成方法。所提出的技术可以揭露不可信测试方对特洛伊木马检测结果的恶意修改。与最新的检测方法相比,该技术不需要制造的金芯片或模拟的金模型。在ISCAS89基准电路上的实验结果表明,所提出的技术能够强大地抵抗修改,并能够以较高的精度(高达91%)检测硬件木马。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号