...
首页> 外文期刊>ACM Transactions on Design Automation of Electronic Systems >Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection
【24h】

Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection

机译:通过对门级非结构化数据和异常检测的特征分析来运行时识别硬件特洛伊木马

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

As the globalization of chip design and manufacturing process becomes popular, malicious hardware inclusions such as hardware Trojans pose a serious threat to the security of digital systems. Advanced Trojans can mask many architectural-level Trojan signatures and adapt against several detection mechanisms. Runtime Trojan detection techniques are considered as a last line of defense against Trojan inclusion and activation. In this article, we propose an offline analysis to select a subset of flip-flops as surrogates and build an anomaly detectionmodel based on the activity profile of flip-flops. These flip-flops are monitored online, and the anomaly detection model implemented online analyzes the flip-flop data to detect any anomalous Trojan activity. The effectiveness of our approach has been tested on several Trojan-inserted designs of the Leon3 processor. Trojan activation is detected with an accuracy score of above 0.9 (ratio of the number of true predictions to total number of predictions) with no false positives by monitoring less than 0.5% of the total number of flip-flops.
机译:随着芯片设计和制造过程的全球化变得流行,硬件特洛伊木马等恶意硬件夹杂物对数字系统的安全构成了严重威胁。高级特洛伊木马可以掩盖许多架构级别的特洛伊木马签名并适应多种检测机制。运行时特洛伊木马检测技术被认为是针对特洛伊木马包含和激活的最后一系列防线。在本文中,我们提出了离线分析,以根据触发器的活动简档选择触发器作为替代品的子集并构建异常检测模型。这些触发器在线监测,并且在线实现的异常检测模型分析了触发器数据以检测任何异常的特洛伊木马活动。我们的方法的有效性已经在leon3处理器的几个特洛伊木马插入的设计上进行了测试。检测特洛伊木马激活,精度得分高于0.9(真实预测的数量与预测总数的比率),通过监测小于触发器总数的0.5%而没有误报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号