计算机工程

• 安全技术 • 上一篇    下一篇

基于特征匹配的IP软核硬件木马检测

倪林 1,石磊 2,韩鹍 1,李少青 2   

  1. (1.西安通信学院 信息安全系,西安 710106;2.国防科学技术大学 计算机学院,长沙 410073)
  • 收稿日期:2015-11-02 出版日期:2017-03-15 发布日期:2017-03-15
  • 作者简介:倪林(1989—),男,助教、硕士,主研方向为芯片安全与防护、IC设计;石磊,硕士研究生;韩鹍,副教授、博士研究生;李少青,研究员、硕士。
  • 基金项目:
    国家自然科学基金“基于功耗特征的硬件木马识别模型与算法研究”(6147137)。

Hardware Trojan Detection of IP Soft Cores Based on Feature Matching

NI Lin  1,SHI Lei  2,HAN Kun  1,LI Shaoqing  2   

  1. (1.Department of Information Security,Xi’an Communications Institute,Xi’an 710106,China; 2.College of Computer,National University of Defense Technology,Changsha 410073,China)
  • Received:2015-11-02 Online:2017-03-15 Published:2017-03-15

摘要: 集成电路设计过程中引入的非受控第三方IP软核较容易被植入硬件木马,以往的功能测试方法较难实现全覆盖检测。为此,分析硬件木马结构及其在IP软核中的实现特征,提出一种基于硬件木马特征匹配的检测方法。给出特征识别流程,构建基于Trust-Hub硬件木马的特征库,在AES算法的RTL级描述中设计3种不同功能类型的硬件木马电路进行分析。实例结果表明,利用提出的特征匹配方法并结合目标载体特征分析,可在冗余代码不高于10%的精度下实现硬件木马的有效识别。

关键词: IP软核, 硬件木马, 安全芯片, 匹配算法, 特征库

Abstract: The introduction of uncontrolled third-party IP soft core introduced in the process of integrated circuit design can easily be embedded with hardware trojans.Traditional,functional testing method is difficult to achieve full coverage detection.So,the paper analyzes the structure of hardware trojans and its implementation characteristics in the IP soft cores,proposes a detection method of hardware Trojans based on feature matching,and presents a complete identification process.In addition,on the basis of building a feature library of hardware Trojans by Trust-Hub,three different types of hardware trojans are designed to be analyzed in the RTL description of AES algorithm.Experimental results show that the method can effectively detect hardware trojans with the help of the characteristic analysis of target carrier.It can realize accurate detection for hardware trojans under the reasonable selection principle when no more than 10% redundancy code is acquired.

Key words: IP soft core, hardware trojan, security chip, matching algorithm, feature library

中图分类号: