a国产,中文字幕久久波多野结衣AV,欧美粗大猛烈老熟妇,女人av天堂

當(dāng)前位置:主頁(yè) > 科技論文 > 電子信息論文 >

基于提高觸發(fā)效率的硬件木馬檢測(cè)方法研究

發(fā)布時(shí)間:2018-12-12 21:22
【摘要】:硬件木馬是對(duì)集成電路中添加的惡意模塊的統(tǒng)稱(chēng),其目的是使集成電路在特定條件下泄露信息或不能正常工作。集成電路由于自身設(shè)計(jì)和制造的特點(diǎn)很容易被嵌入硬件木馬,例如設(shè)計(jì)中使用不可信的IP核、EDA工具、庫(kù)單元,或是制造時(shí)送到不可信的代工廠,都有可能引入硬件木馬到集成電路中。集成電路的應(yīng)用涉及到國(guó)家安全、通信、金融等重要領(lǐng)域的所有關(guān)鍵設(shè)備。如果嵌入硬件木馬的集成電路被應(yīng)用到這些領(lǐng)域可能會(huì)引起災(zāi)難性后果,所以確保集成電路中不含有硬件木馬是十分重要的。為了解決這一問(wèn)題,本文對(duì)如何快速、高效地檢測(cè)制造階段嵌入的數(shù)字型硬件木馬進(jìn)行了研究。本文首先對(duì)硬件木馬的觸發(fā)模型進(jìn)行分析,得出稀有邏輯值出現(xiàn)概率小和內(nèi)部節(jié)點(diǎn)可控性差是制約硬件木馬被觸發(fā)的兩個(gè)關(guān)鍵因素。在此基礎(chǔ)上,本文提出一種提高硬件木馬活性的觸發(fā)方案:利用集成電路的固有掃描鏈結(jié)構(gòu)將集成電路分割成以芯片輸入、輸出和掃描鏈為邊界的組合邏輯塊,提高內(nèi)部節(jié)點(diǎn)的可控性;對(duì)ATPG生成的備選向量再優(yōu)化,用于提高稀有邏輯值的出現(xiàn)概率。在提高硬件木馬活性的觸發(fā)方案的基礎(chǔ)上,本文設(shè)計(jì)了一種同時(shí)使用邏輯測(cè)試法和旁路分析法的硬件木馬檢測(cè)方案。最后分別對(duì)硬件木馬觸發(fā)與檢測(cè)的效果進(jìn)行了仿真驗(yàn)證。實(shí)驗(yàn)結(jié)果表明:(1)在基于邏輯測(cè)試法的檢測(cè)方案中,與常用的ATPG技術(shù)生成的測(cè)試向量相比,本文提出的提高木馬活性的觸發(fā)方案能夠以更短的時(shí)間觸發(fā)更多的硬件木馬,并且這種優(yōu)勢(shì)隨著硬件木馬觸發(fā)難度的增加而增加,最多可多觸發(fā)21.96%的組合觸發(fā)型硬件木馬并縮短97.02%的平均觸發(fā)時(shí)間,多觸發(fā)33.40%的異步計(jì)數(shù)器觸發(fā)型硬件木馬并縮短94.20%的平均觸發(fā)時(shí)間。(2)在基于旁路分析法的檢測(cè)實(shí)驗(yàn)中,硬件木馬的特征可以明顯地被識(shí)別出來(lái),并且本文提出的提高硬件木馬活性的觸發(fā)方案能夠提高硬件木馬相連節(jié)點(diǎn)的翻轉(zhuǎn)率,增大硬件木馬的動(dòng)態(tài)功耗,使硬件木馬的功耗特征更加明顯。
[Abstract]:The hardware Trojan is a general term for the malicious modules added in the integrated circuits. The purpose of the Trojan is to make the integrated circuits leak information or not work properly under certain conditions. Integrated circuits are easily embedded in hardware Trojans because of their own design and manufacturing characteristics, such as the use of untrusted IP cores, EDA tools, library units, or delivery to untrusted consignors during manufacture. It is possible to introduce hardware Trojans into integrated circuits. The application of integrated circuits involves all the key equipment in important fields such as national security, communication, finance and so on. If integrated circuits embedded in hardware Trojans are applied to these fields, they may have disastrous consequences, so it is very important to ensure that the integrated circuits do not contain hardware Trojans. In order to solve this problem, this paper studies how to detect the digital hardware Trojan embedded in manufacturing phase quickly and efficiently. This paper first analyzes the trigger model of the hardware Trojan horse and concludes that the low probability of rare logic value and the poor controllability of internal nodes are the two key factors restricting the trigger of the hardware Trojan horse. On this basis, this paper proposes a trigger scheme to improve the activity of the hardware Trojan: the integrated circuit is divided into a combinational logic block with the input, output and scan chains as the boundary by using the inherent scan chain structure of the integrated circuit. Improving the controllability of internal nodes; The alternative vectors generated by ATPG are optimized to increase the probability of occurrence of rare logic values. Based on the trigger scheme of improving the activity of the hardware Trojan horse, this paper designs a hardware Trojan horse detection scheme using both logic test and bypass analysis. Finally, the effect of trigger and detection of hardware Trojan horse is simulated and verified. The experimental results show that: (1) in the detection scheme based on logic test, compared with the test vector generated by ATPG technology, the trigger scheme proposed in this paper can trigger more Trojan horses in a shorter time. And this advantage increases with the increase of the trigger difficulty of the hardware Trojan, and can trigger up to 21.96% of the combined trigger hardware Trojan and shorten the average trigger time of 97.02%. The multi-trigger 33.40% asynchronous counter triggers the hardware Trojan and shortens the average trigger time by 94.20%. (2) in the detection experiment based on bypass analysis, the characteristics of the hardware Trojan can be clearly recognized. Furthermore, the trigger scheme proposed in this paper can improve the turnover rate of the connected nodes of the hardware Trojan, increase the dynamic power consumption of the hardware Trojan, and make the power characteristics of the hardware Trojan more obvious.
【學(xué)位授予單位】:大連理工大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類(lèi)號(hào)】:TP309;TN405

【參考文獻(xiàn)】

相關(guān)期刊論文 前2條

1 于宗光;黃偉;;中國(guó)集成電路設(shè)計(jì)產(chǎn)業(yè)的發(fā)展趨勢(shì)[J];半導(dǎo)體技術(shù);2014年10期

2 周麗;李清寶;樊敏;趙巖;;邏輯未知PLD的安全性漏洞檢測(cè)方法[J];計(jì)算機(jī)工程;2010年18期

,

本文編號(hào):2375264

資料下載
論文發(fā)表

本文鏈接:http://www.wukwdryxk.cn/kejilunwen/dianzigongchenglunwen/2375264.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶ec52b***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
国产三级国产精品国产普男人| 国产大屁股视频免费区| 亚洲精品成a人在线观看| 色就是色| 日韩av在线免费看| 亚洲爽妇网| 99精品一区二区| 亚洲第一色| 天堂久久久爱| 天堂а√在线中文在线鲁大师| 国产乱人伦偷精品视频免| 国产AV麻豆精品第一页| 精品亚洲成a人片在线观看下载 | 精品亚洲麻豆1区2区3区| 日韩欧美区| 欧美a黄片| 中文字幕乱码一区二区三区 | 午夜999| 色在线播放| 精品a区| 欧美激情视频一区二区三区不卡 | 国产精品VA无码免费麻豆| 伊人久久精品无码麻豆一区 | 亚洲乱码精品久久久久.. | 内射无码专区久久亚洲| 亚洲国产精品一区二区九九| 性色av无码无在线观看| 久久精品国产亚洲AV麻豆蜜芽 | 在线观看欧美日韩亚洲中字国产| 亚洲丁香婷婷综合久久| 免费人成在线观看| 国产无遮挡AAA片爽爽| 国产精品亚洲А∨无码播放| 日本另类αv欧美另类aⅴ| 99精品久久久久中文字幕| 亚洲国产日本| 天堂久久久爱| 一区欧美| 日韩综合一区| av日本| 久久99久久99精品中文字幕|