广东工业大学学报 ›› 2013, Vol. 30 ›› Issue (4): 70-73.doi: 10.3969/j.issn.1007-7162.2013.04.012

• 综合研究 • 上一篇    下一篇

电磁泄漏型硬件木马设计与检测

谢海1, 2,恩云飞2,王力纬2   

  1. 1.广东工业大学 材料与能源学院,广东 广州 510006;2. 工业和信息化部电子第五研究所 电子元器件可靠性物理及其应用技术重点实验室,广东 广州 510610
  • 收稿日期:2013-03-18 出版日期:2013-12-30 发布日期:2013-12-30
  • 作者简介:谢海(1985-),男,硕士研究生,主要研究方向为硬件木马电路的设计与检测.
  • 基金资助:

    总装备部预研项目(51308040413);总装备部元器件共性课题(1004GK0023)

Design and Detection of Hardware Trojan Based on Electromagnetic Leakage

Xie Hai1, 2,  En Yun-fei2, Wang Li-wei2   

  1. 1. School of Materials and Energy,Guangdong University of Technology, Guangzhou 510640, China; 2. Science and Technology on Reliability Physics and Application of Electronic Component Laboratory, CEPREI, Guangzhou 510610, China
  • Received:2013-03-18 Online:2013-12-30 Published:2013-12-30

摘要: 针对集成电路在设计或制造过程中容易受到硬件木马的攻击,从而威胁芯片与硬件安全性的问题,介绍了硬件木马的基本原理及其分类方法,在此基础上设计了一种电磁泄漏型硬件木马,该木马电路能通过电磁发射的方式泄漏密码芯片的密钥.搭建了基于现场可编程门电路FPGA的AES(Advanced Encryption Standard)加密电路测试平台,利用旁路分析的方法,对该种结构类型的硬件木马电路进行了检测与分析.实验结果表明:该硬件木马电路能在使用者毫不知情的情况下成功获取128位的AES加密密钥;硬件木马检测方法能发现AES加密电路中的这种木马电路,并实现10-2 的检测分辨率.

关键词: 硬件木马;芯片安全;现场可编程门电路(FPGA);检测

Abstract: Aimed at the problem that integrated circuits (ICs) may be attacked by hardware Trojan during the process of design or fabrication, thereby posing a significant risk in terms of their trusted field operation, it introduces the basic principles and taxonomy of hardware Trojan, and proposes the design of a kind of hardware Trojan, based on electromagnetic leakage. The Trojan circuit can reveal the encryption key of cipher IC by using electromagnetic emission. Based on FPGA(Field Programmable Gate Array) chips, an automatic cipher circuit test platform of AES (Advanced Encryption Standard) was constructed. By the analysis of the side channel, the hardware Trojan circuit could be detected. The experimental results show that the hardware Trojan can secretly steal the 128 bit AES encryption key, and that the detection method can help to identify this type of Trojan in AES cipher circuit, achieving the detection rate of 10-2.

Key words: hardware Trojan; IC Security; FPGA(Field Programmable Gate Array); detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!