Chip Waveforms Attribute Recognition Model Research and Design

Article Preview

Abstract:

For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction scheme and key Enabling technologies. Designed to target chip waveforms attribute recognition model, through the analysis of multiple properties of the model and proof, the work is given waveform attribute recognition model parameter setting principles.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3299-3303

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. Biham, Yaniv Carmeli, and A. Shamir. Bug attacks[A]. CRYPTO 2008[C], LNCS 5157, 2008: 221-240.

DOI: 10.1007/978-3-540-85174-5_13

Google Scholar

[2] Adee S. The hunt for the kill switch [J]. IEEE Specitrum 2008, 45(5): 34-39.

Google Scholar

[3] Zhang Peng, Wang Xin-Cheng, Zhou Qing. Hardware trojans detection based on projection pursuit. Journal on Communications, 2013, Vol. 34(4): 122-126, 137.

Google Scholar

[4] Tu Hao. Design and realization of hardware trojan based on side-channel analysis[D]. Changsha, Hunan P.R. China: Computer Science and Technology Graduate School of National University of Defense Technology, (2010).

Google Scholar

[5] Xiaoxiao Wang, Hassan Salmani and Mohammad Tehranipoor, Jim Plusquellic. Hardware trojan detection and isolation using current integration and localized current analysis[C]. DFT '08 Proceedings of the 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems. Oct. (2008).

DOI: 10.1109/dft.2008.61

Google Scholar

[6] Agrawal D, Baktir S, Karakoyunlu D, et al. Trojan detection using IC fingerprinting[C]/Proceedings of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1007: 196-310.

DOI: 10.1109/sp.2007.36

Google Scholar

[7] Song Pu, LI Qingbao,. Xiao Da, FAN Min. State-network generation algorithm of encrypted synchronization sequential machines. Computer Engineering and Design[J]. 2008. Vol. 29(6): 1331-1335.

Google Scholar