首页> 外文期刊>Very Large Scale Integration (VLSI) Systems, IEEE Transactions on >A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions
【24h】

A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions

机译:真实过程和环境条件下检测硬件木马功率信号方法的灵敏度分析

获取原文
获取原文并翻译 | 示例

摘要

Trust in reference to integrated circuits addresses the concern that the design and/or fabrication of the integrated circuit (IC) may be purposely altered by an adversary. The insertion of a hardware Trojan involves a deliberate and malicious change to an IC that adds or removes functionality or reduces its reliability. Trojans are designed to disable and/or destroy the IC at some future time or they may serve to leak confidential information covertly to the adversary. Trojans can be cleverly hidden by the adversary to make it extremely difficult for chip validation processes, such as manufacturing test, to accidentally discover them. This paper investigates the sensitivity of a power supply transient signal analysis method for detecting Trojans. In particular, we focus on determining the smallest detectable Trojan, i.e., the least number of gates a Trojan may have and still be detected, using a set of process simulation models that characterize a TSMC 0.18 $mu$m process. We also evaluate the sensitivity of our Trojan detection method in the presence of measurement noise and background switching activity.
机译:对集成电路的信任解决了这样的问题,即对手可能会故意改变集成电路(IC)的设计和/或制造。插入硬件特洛伊木马涉及对IC的蓄意和恶意更改,以添加或删除功能或降低其可靠性。特洛伊木马程序被设计为在将来某个时间禁用和/或销毁IC,否则它们可能会秘密地将机密信息泄露给对手。对手可以巧妙地隐藏特洛伊木马,这使得芯片验证过程(例如制造测试)极难偶然发现它们。本文研究了一种检测木马的电源瞬态信号分析方法的灵敏度。特别是,我们着重于使用一组表征台积电0.18μm工艺的过程仿真模型来确定最小的可检测特洛伊木马,即特洛伊木马可能拥有并仍被检测到的最小门数。我们还评估了存在测量噪声和背景切换活动时特洛伊木马检测方法的灵敏度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号