首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于有限状态机的硬件木马设计和插入
引用本文:李蕾,尚子靖,冯建华,张兴,安辉耀.基于有限状态机的硬件木马设计和插入[J].北京大学学报(自然科学版),2013,49(6):1105.
作者姓名:李蕾  尚子靖  冯建华  张兴  安辉耀
作者单位:北京大学信息科学技术学院, 北京100871;
摘    要:针对集成电路设计和制造中存在的硬件木马问题, 提出一种新的模型来提高木马检测能力。该模型基于有限状态机, 比组合电路型木马难于触发和检测。同时, 木马电路插入位置的选择也可以有效规避路径延时检测方法。实验选择ISCAS’89基准电路中的S349作为目标电路, 对功能和延时信息进行仿真。实验结果表明, 这种类型的木马难于激活, 并且选择合适的插入位置可以有效隐藏延时信息。

关 键 词:硬件木马  木马插入  硬件安全  路径延时检测  
收稿时间:2012-10-23

Design and Insertion of Hardware Trojan Based on Finite State Machine
LI Lei,SHANG Zijing,FENG Jianhua,ZHANG Xing,AN Huiyao.Design and Insertion of Hardware Trojan Based on Finite State Machine[J].Acta Scientiarum Naturalium Universitatis Pekinensis,2013,49(6):1105.
Authors:LI Lei  SHANG Zijing  FENG Jianhua  ZHANG Xing  AN Huiyao
Institution:School of Electronics Engineering and Computer Science, Peking University, Beijing 100871;
Abstract:According to the hardware Trojans inserted during design and fabrication, the authors provide a new model of Trojan. New model is based on a finite state machine which is more difficult to trigger and detect than those based on combinational circuits. Also, the locations in target circuits to insert Trojans are considered to avoid being detected using path delay fingerprint method. S349 circuit from ISCAS’89 benchmark circuits is chosen as the target circuit. Functional simulations are performed and delay information is simulated. The results show that this type of hardware Trojan is difficult to activate and the insertion method is effective to hide delay information.
Keywords:hardware Trojan  Trojan insertion  hardware security  path delay detection  
本文献已被 万方数据 等数据库收录!
点击此处可从《北京大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《北京大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号