基于路径延迟故障序列的硬件木马检测方法
Hardware Trojan detection based on path delay fault sequence
伍远翔 1唐明 1胡一凡 1张吉良2
作者信息
- 1. 武汉大学 国家网络安全学院空天信息安全与可信计算教育部重点实验室,湖北武汉 430072
- 2. 湖南大学半导体学院(集成电路学院),湖南长沙 410082
- 折叠
摘要
针对基于侧信道信号的硬件木马检测普遍面临的两类问题,即需要黄金芯片和信号测量成本大,提出一种利用路径延迟故障序列的检测方法.基于时序冲突时电路路径产生延迟故障的先后顺序,间接利用路径延迟之间相对大小关系产生芯片检测ID;检测不依赖于黄金芯片,且在大范围的环境变化和工艺偏差下具有稳定性;故障序列在芯片设计阶段仿真获得,无需额外硬件开销.对ISCAS-89基准和AES-128电路实例验证了检测的有效性,其可成功检测插入的两种类型硬件木马.
Abstract
The mainstream hardware Trojan detection based on side channel generally faces two problems of golden chip and delay measurement cost.As a solution,a detection method using delay fault sequence was proposed.Based on the sequence of circuit path delay faults in the case of timing conflict,the chip detection ID was generated by indirectly using the relative relationship be-tween path delays,which did not depend on the golden chip,and remained unchanging in a wide range of environment variation and process deviations.The fault sequence was obtained by simulation in the chip design stage without additional hardware over-head.The effectiveness of the detection is verified in the ISCAS-89 benchmark and AES-128 circuit experiments.It can success-fully detect two types of inserted hardware Trojans.
关键词
集成电路/硬件木马/检测方法/侧信道/黄金芯片/路径延迟/故障输出Key words
integrated circuit/hardware Trojan/detection method/side channel/golden chip/path delay/fault output引用本文复制引用
基金项目
国家自然科学基金项目(61972295)
国家自然科学基金项目(62122023)
国家自然科学基金项目(U20A20202)
武汉市科技项目应用基础前沿专项基金项目(2019010701011407)
出版年
2024