...
首页> 外文期刊>Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on >Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans
【24h】

Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans

机译:温度跟踪:进行鲁棒的硬件木马运行时检测

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose three innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. The first one is a local sensor-based approach that uses information from thermal sensors together with hypothesis testing to make a decision. The second one is a global approach that exploits correlation between sensors and maintains track of the ICs thermal profile using a Kalman filter (KF). The third approach incorporates leakage power into the system dynamic model and apply extended KF (EKF) to track ICs thermal profile. Simulation results using state-of-the-art tools on ten publicly available Trojan benchmarks verify that all three proposed approaches can detect active Trojans quickly and with few false positives. Among three approaches, EKF is flawless in terms of the ten benchmarks tested but would require the most overhead.
机译:硬件Trojan威胁促使集成电路(IC)生命周期的所有阶段都开发了Trojan检测方案。尽管大多数现有方案在测试时都将重点放在IC上,但是部署后/运行时Trojan检测提供了许多独特的优势。但是,运行时方法并未得到充分利用,先前的工作突显了在有限的硬件资源下实现它们所面临的挑战。在本文中,我们提出了三种创新的运行时木马检测的低开销方法,这些方法利用了许多现代系统中已经可用的热传感器来检测由木马激活引起的功率/热分布的偏差。第一种是基于本地传感器的方法,该方法使用来自热传感器的信息以及假设检验来做出决策。第二种是一种全局方法,该方法利用传感器之间的相关性,并使用卡尔曼滤波器(KF)来跟踪IC的热分布。第三种方法将泄漏功率整合到系统动态模型中,并应用扩展的KF(EKF)来跟踪IC的温度曲线。在十个公开的特洛伊木马程序基准上使用最先进的工具进行的仿真结果证明,所有三种提议的方法都可以快速检测活动的特洛伊木马,并且几乎没有误报。在三种方法中,EKF就十个测试基准而言是完美无缺的,但将需要最大的开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号