Detection of Hardware Trojan
|關鍵字:||硬體安全防護;惡意電路;硬體木馬;旁通道訊號分析;hardware trojan horse;malicious circuit;hardware security detection;side-channel analysis|
|摘要:||Short wave infrared (SWIR), read-out integrated circuit (ROIC) and focal plane array
Most of the hardware Trojan horse is a passive monitor and extend the operational life cycle until they are triggered. Trojan hidden hardware features, this means that they are hidden under the normal operation of the circuit themselves, and unlike most circuits can be controlled as observed that if after the dismantling of the chip, the detection of this devastating result in the chip must be discarded, and can not guarantee that other chips have not been hardware Trojan horse attacks. This project is expected to adopt side-channel signals (SCS) to detect the hardware Trojans, as belonging to the testing-based methods, based on the measurement next to the channel signal parameters (power consumption, delay time, etc.). When a circuit is a malicious Trojan added hardware, the hardware Trojan causes some significant changes in parameters. In first, we can measure a non-Trojan (Trojan-free) circuit next to the channel signal parameters as a benchmark. If such parameters are significantly different, we can confirm that the circuit have been maliciously into the Trojan.
|Appears in Collections:||Research Plans|
Files in This Item: