...
首页> 外文期刊>Microelectronics Journal >An efficient methodology for hardware Trojan detection based on canonical correlation analysis
【24h】

An efficient methodology for hardware Trojan detection based on canonical correlation analysis

机译:基于规范相关分析的硬件木马检测有效方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Side-channel (SC) analyses are extensively used for achieving hardware Trojan detection (TD) by analyzing the anomalies of SC leakages of the suspicious integrated circuits (ICs). However, when a suspicious IC is employed with an SC attack countermeasure (SCAC) to resist against SC attacks, the SC leakages of the IC may become random. Under such a circumstance, the conventional SC analyses are not efficient in detecting the potential embedded Trojans within the suspicious IC since the random SC leakages may mask the critical features of the Trojans. To address this issue, a novel SC analysis based on canonical correlation analysis (CCA) is proposed in this paper. The possible correlations among the random SC leakages are efficiently extracted and processed to distinguish the different features between the SCAC and the embedded Trojans under the assistance of CCA. Result shows that the proposed SC analysis is able to enhance the TD accuracy by 11.3% as compared to the previous SC analyses.
机译:通过分析可疑集成电路(ICS)的SC泄漏的异常,广泛地广泛地用于实现硬件特洛伊木马检测(TD)的侧通道(SC)分析。然而,当通过SC攻击对策(SCAC)使用可疑IC来抵抗SC攻击时,IC的SC泄漏可能会随机变为随机。在这种情况下,传统的SC分析在检测可疑IC内的潜在嵌入式特洛伊木马的情况下,由于随机SC泄漏可能掩盖特洛伊木马的关键特征,因此在检测到可疑IC中的潜在嵌入式特洛伊木马。为了解决这个问题,本文提出了一种基于规范相关分析(CCA)的新型SC分析。随机SC泄漏之间的可能相关性被有效地提取和处理,以区分SCAC和嵌入式特洛伊之间的不同特征在CCA的帮助下。结果表明,与先前的SC分析相比,所提出的SC分析能够通过11.3%提高TD精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号