信息网络安全 ›› 2016, Vol. 16 ›› Issue (1): 11-17.doi: 10.3969/j.issn.1671-1122.2016.01.003

• • 上一篇    下一篇

硬件木马威胁与识别技术综述

周昱1,2, 于宗光1,3()   

  1. 1.中国电子科技集团公司第五十八研究所,江苏无锡 214072
    2.中国电子科学研究院 北京 100041
    3.西安电子科技大学微电子学院,陕西西安 710071
  • 收稿日期:2015-11-19 出版日期:2016-01-01 发布日期:2020-05-13
  • 作者简介:

    作者简介: 周昱(1983-),男,江苏,博士研究生,主要研究方向为芯片安全性测试、芯片防伪仿篡改设计;于宗光(1964-),男,山东,研究员,博士,主要研究方向为集成电路设计开发。

Threat Analysis and Detection Techniques of Hardware Trojans

Yu ZHOU1,2, Zongguang YU1,3()   

  1. 1. No. 58 Research Institute, China Electronic Technology Group Corporation, Wuxi Jiangsu 214072, China
    2. China Academy of Electronics and Information Technology, Beijing 100041, China
    3. School of Microelectornics, Xidian University, Xi'an Shaanxi 710071, China
  • Received:2015-11-19 Online:2016-01-01 Published:2020-05-13

摘要:

软件木马曾被认为是计算机系统的唯一安全威胁,计算机系统内的硬件即集成电路被普遍认为是安全可信的。但随着硬件木马这一针对集成电路及其应用的新的安全威胁的出现,打破了硬件安全可信的传统观点。硬件木马是集成电路在设计与制造过程中遭到人为恶意篡改而形成的影响电路功能、性能等参数的各种逻辑后门与漏洞。硬件木马的攻击模型有很多种,有的会改变电路的逻辑功能;有的会泄露电路内部的机密信息;还有的既不改变电路的功能,也不泄露电路内的机密信息,但能协助软件木马来攻击整个系统。随着集成电路设计的日益复杂,制造成本日趋高昂,集成电路产业正朝着全球合作的方向发展,集成电路在其产业链各环节受到硬件木马攻击的威胁将会越来越大,因此发展硬件木马的识别技术来保证集成电路的安全性已迫在眉睫。文章主要分析硬件木马造成的威胁,包括各种攻击模型及其分类,介绍当前硬件木马识别技术的最新研究进展,阐述未来该领域的研究热点。

关键词: 硬件木马, IP安全性验证, 旁路分析, 逻辑测试, 光学分析

Abstract:

Software virus has been considered as the only security threat of a computer system, while the IC (integrated circuit) used in a computer system is considered trusted and secure until the emergency of hardware Trojan. The hardware Trojan is formed by malicious modification during designing and manufacturing, which changes the function and performance of ICs. Different hardware Trojans cause different impact on ICs, like changing the function, leaking internal information or assisting software virus attack. As the design complexity and cost of IC designing and manufacturing continue growing, IC industry relies on the global cooperation which enhances the vulnerability to hardware Trojan attacks. In the paper, we analyze the threat of hardware Trojan attack including the attacking model and Trojan taxonomy, introduce the latest research efforts on detection techniques, and finally describe the area of potential future research.

Key words: hardware Trojan, IP security verification, side-channel analysis, logic test, optical analysis

中图分类号: