首页 | 官方网站   微博 | 高级检索  
     

硬件木马技术研究进展
引用本文:尹勇生,汪涛,陈红梅,邓红辉.硬件木马技术研究进展[J].微电子学,2017,47(2):233-238.
作者姓名:尹勇生  汪涛  陈红梅  邓红辉
作者单位:合肥工业大学 微电子设计研究所, 合肥 230009,合肥工业大学 微电子设计研究所, 合肥 230009,合肥工业大学 微电子设计研究所, 合肥 230009,合肥工业大学 微电子设计研究所, 合肥 230009
基金项目:安徽省科技攻关资助项目(JZ2014AKKG0430);中央高校基本科研业务费专项资金资助项目(2014HGCH0010)
摘    要:通常存在于应用软件、操作系统中的信息安全问题正在向硬件蔓延。硬件木马是集成电路芯片从研发设计、生产制造到封装测试的整个生命周期内被植入的恶意电路,一经诱发,将带来各种非预期的行为,造成重大危害。当前,SoC芯片大量复用IP核,意味着将有更多环节招致攻击;日益增长的芯片规模又使得硬件木马的检测变得更难、成本更高。因此,硬件木马的相关技术研究成为硬件安全领域的热点。介绍了硬件木马的概念、结构、植入途径和分类,对硬件木马的设计、检测和防御技术进行了分析、总结和发展趋势预测,着重分析了检测技术。

关 键 词:信息安全    集成电路芯片安全    硬件木马    检测    防御
收稿时间:2016/3/4 0:00:00

Study on Hardware Trojan Technology
YIN Yongsheng,WANG Tao,CHEN Hongmei and DENG Honghui.Study on Hardware Trojan Technology[J].Microelectronics,2017,47(2):233-238.
Authors:YIN Yongsheng  WANG Tao  CHEN Hongmei and DENG Honghui
Affiliation:Institute of VLSI Design, Hefei University of Technology, Hefei 230009, P. R. China,Institute of VLSI Design, Hefei University of Technology, Hefei 230009, P. R. China,Institute of VLSI Design, Hefei University of Technology, Hefei 230009, P. R. China and Institute of VLSI Design, Hefei University of Technology, Hefei 230009, P. R. China
Abstract:Information security issues normally presenting in software and operating systems are now spreading to hardware. Hardware Trojan refers to the malicious circuit implanted from the integrated circuit designing, manufacturing, packaging and testing throughout the whole life cycle. It will bring a variety of unexpected behaviors and cause significant damages once being evoked. Currently, SoC chips are reusing a large number of IP core, and it means there are more links lead to be attacked. Moreover, the increasing chip size make the hardware Trojan detection become more difficult and more expensive. Therefore, the technology research related to hardware Trojan is becoming a hot field of hardware security. The concept, structure, implant method and classification of hardware Trojan were introduced, and the trends of design, detection and defense technologies for hardware Trojan were analyzed, summarized and forecasted. The detection technology was analyzed emphatically.
Keywords:
点击此处可从《微电子学》浏览原始摘要信息
点击此处可从《微电子学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号