[1]薛明富,胡爱群,刘威,等.基于子空间域特征提取的硬件木马检测方法 [J].东南大学学报(自然科学版),2014,44(3):457-461.[doi:10.3969/j.issn.1001-0505.2014.03.001]
 Xue Mingfu,Hu Aiqun,Liu Wei,et al.Detecting hardware Trojan through feature extraction in subspace domain[J].Journal of Southeast University (Natural Science Edition),2014,44(3):457-461.[doi:10.3969/j.issn.1001-0505.2014.03.001]
点击复制

基于子空间域特征提取的硬件木马检测方法  ()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
44
期数:
2014年第3期
页码:
457-461
栏目:
计算机科学与工程
出版日期:
2014-05-16

文章信息/Info

Title:
Detecting hardware Trojan through feature extraction in subspace domain
作者:
薛明富12胡爱群1刘威1王有东1
1东南大学信息科学与工程学院, 南京 210096; 2南洋理工大学电气电子工程学院, 新加坡
Author(s):
Xue Mingfu12 Hu Aiqun1 Liu Wei1 Wang Youdong1
1School of Information Science and Engineering, Southeast University, Nanjing 210096, China
2School of Electrical Electronic Engineering, Nanyang Technological University, Singapore
关键词:
硬件木马检测 硬件安全 信息安全 子空间域
Keywords:
hardware Trojan detection hardware security information security subspace domain
分类号:
TP309.1
DOI:
10.3969/j.issn.1001-0505.2014.03.001
摘要:
为了解决制造变异和噪声对已有硬件木马检测方法的挑战和干扰,提出了一种新的微弱木马信号检测技术,能够在较大的制造变异和噪声的背景下提取出木马特征信号.首先,将木马检测问题建模为特征提取模型,然后提出了一个基于时域约束估计器和主成分投影的统一子空间木马检测方法.并通过特定的子空间投影或重构信号分析,证实弱小的木马信号可以与各种噪声和干扰区分开来.该方法为已有的硬件木马检测方法提供了一种通用的消除制造变异和噪声影响的方法.设计实现了2个时序硬件木马,在ISCAS89基准电路上进行了仿真实验验证,并在FPGA上进行了硬件实物验证,实验结果均表明了所提方法的有效性和高检测精度.
Abstract:
In order to eliminate the challenge and interference of the process variation and noises on existing hardware Trojan detection methods, a novel hardware Trojan detection technique is presented, which can detect tiny hardware Trojan characteristics under large process variation and background noises. First, the hardware Trojan detection problem is mathematically formulated as a feature extraction model. Then, a unified subspace hardware Trojan detection technique is proposed based on time domain constrained estimator and principal component projection. It is proved that the weak hardware Trojan signal can be distinguished from various noise sources through particular subspace projections or reconstructed clean signal analysis. The proposed technique provides a general method for related works to eliminate the impact of process variations and noises. Two sequential hardware Trojans are designed and implemented. Both simulation experiments on ISCAS89 benchmark circuits and hardware validations on FPGA(field programmable gate array)boards show the effectiveness and high sensitivity of the proposed hardware Trojan detection technique.

参考文献/References:

[1] Chakraborty R S, Narasimhan S, Bhunia S. Hardware Trojan: threats and emerging solutions [C]//IEEE International High Level Design Validation and Test Workshop. San Francisco, CA, USA, 2009: 166-171.
[2] Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy and detection [J]. IEEE Design and Test of Computers, 2010, 27(1): 10-25.
[3] Lieberman J. National security aspects of the global migration of the U.S. Semiconductor Industry [R]. Washington DC, USA: Airland Subcommittee, US Senate Armed Services Committee, 2003: 7468-7471.
[4] Rajendran J, Jyothi V, Sinanoglu O, et al. Design and analysis of ring oscillator based design-for-trust technique [C]//VLSI Test Symposium. Dana Point, CA, USA, 2011: 105-110.
[5] Chakraborty R S, Wolff F, Paul S, et al. MERO: a statistical approach for hardware Trojan detection [C]//Workshop on Cryptographic Hardware and Embedded Systems. Lausanne, Switzerland, 2009: 396-410.
[6] Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting [C]//Proceedings of IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2007: 296-310.
[7] Jin Y, Makris Y. Hardware Trojan detection using path delay fingerprint [C]//Proceedings of IEEE International Hardware-Oriented Security and Trust. Arlington, VA, USA, 2008: 51-57.
[8] Aarestad J, Acharyya D, Rad R, et al. Detecting Trojans through leakage current analysis using multiple supply pad IDDQs [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 893-904.
[9] Salmani H, Tehranipoor M. Layout-aware switching activity localization to enhance hardware Trojan detection [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 76-87.
[10] Ephraim Y, Van Trees H L. A signal subspace approach for speech enhancement [J]. IEEE Transactions on Speech and Audio Processing, 1995, 3(4): 251-266.

备注/Memo

备注/Memo:
收稿日期: 2013-11-02.
作者简介: 薛明富(1986—),男,博士生;胡爱群(联系人),男,博士,教授,博士生导师,aqhu@seu.edu.cn.
基金项目: 国家发展改革委员会信息安全专项基金资助项目.
引用本文: 薛明富,胡爱群,刘威,等.基于子空间域特征提取的硬件木马检测方法[J].东南大学学报:自然科学版,2014,44(3):457-461. [doi:10.3969/j.issn.1001-0505.2014.03.001]
更新日期/Last Update: 2014-05-20