首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{rm DDQ}$s
【24h】

Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{rm DDQ}$s

机译:使用多个电源焊盘$ {I} _ {rm DDQ} $ s通过泄漏电流分析检测木马

获取原文
获取原文并翻译 | 示例
           

摘要

Hardware Trojans have emerged as a new threat to the security and trust of computing systems. Hardware Trojans are deliberate and malicious modifications to the logic function implemented within digital and mixed signal chips. In contrast to software Trojans, it is not possible to simply “scan the hard drive” to eradicate a hardware Trojan. Hardware Trojans can be designed to shutdown the chip at some predetermined time and/or when some specific signal or data pattern is received. They may also be designed to remain hidden while leaking confidential information covertly to the adversary. Determining whether a hardware Trojan has been inserted into a chip is extremely difficult for a variety of reasons, e.g., nanometer feature sizes and chip design complexity combine to make optical inspection difficult or impossible. This paper presents experimental results demonstrating the effectiveness of a Trojan detection method that is based on the analysis of a chip''s ${I}_{rm DDQ}$s (steady-state current), which are measured simultaneously from multiple places on the chip. The proposed method also incorporates a technique for virtually eliminating process and test environment variations effects which act to reduce detection sensitivity of traditional testing approaches. Used together, resolution enhancements of up to a 1000$times$ are possible over conventional single power supply current measurement techniques. A regression-based statistical technique is applied to the data collected from a set of chips fabricated in a 65-nm process to illustrate the detection capabilities and limitations of this type of approach.
机译:硬件木马已成为对计算系统安全性和信任度的新威胁。硬件木马是对数字和混合信号芯片中实现的逻辑功能的蓄意和恶意修改。与软件特洛伊木马相反,不可能简单地“扫描硬盘”来根除硬件特洛伊木马。可以将硬件木马设计为在某个预定时间和/或在收到某些特定信号或数据模式时关闭芯片。它们还可能被设计为隐藏,同时将机密信息秘密泄露给对手。由于多种原因,例如,将纳米特征尺寸和芯片设计复杂性结合在一起,使得光学检查变得困难或不可能,因此确定是否已将硬件Trojan插入芯片是极其困难的。本文提供的实验结果证明了木马检测方法的有效性,该方法基于对芯片的$ {I} _ {rm DDQ} $ s(稳态电流)进行分析,并从多个位置同时测量在芯片上。所提出的方法还结合了一种虚拟消除工艺和测试环境变化影响的技术,这种影响可降低传统测试方法的检测灵敏度。一起使用,与传统的单电源电流测量技术相比,分辨率可以提高高达1000倍。基于回归的统计技术应用于从以65纳米工艺制造的一组芯片中收集的数据,以说明这种方法的检测能力和局限性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号