【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 6970次   下载 10702 本文二维码信息
码上扫一扫!
硬件木马研究动态综述
赵剑锋,史岗
分享到: 微信 更多
(中国科学院信息工程研究所 第五实验室 北京 中国 100093)
摘要:
由于集成电路的设计制造技术越来越复杂,使得芯片在设计及生产过程中充满潜在的威胁,即有可能被加入硬件木马。硬件木马有可能改变系统功能,泄漏重要信息,毁坏系统或造成拒绝服务等危害。文章系统的介绍了硬件木马的产生背景、概念及性质、国内外研究现状,对国内外研究现状进行了分析比较;介绍了硬件木马的常见分类方式,并结合实例加以说明;常用的检测方法分类,并结合案例,说明各种检测方法的优缺点;介绍了硬件木马的安全防范措施,结合案例说明各种防范措施的特点;最后总结全文,指出现有研究存在的问题,并展望了硬件木马的研究方向与重点。
关键词:  硬件木马  设计  检测  安全措施
DOI:10.19363/j.cnki.cn10-1380/tn.2017.01.006
投稿时间:2016-09-19修订日期:2016-11-15
基金项目:本课题得到国家“核高基”科技重大专项基金项目(No.2013ZX01029003-001);国家“八六三”高技术研究发展计划基金项目(No.2012AA01A401)资助。
A Survey on the studies of Hardware Trojan
ZHAO Jianfeng,SHI Gang
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Abstract:
With the increasing complexity of IC design and fabrication, IC design and fabrication is endangered by potential threat like the inserted Hardware Trojan. Hardware Trojan may change the function of system, lead to the leakage of important information, damage the system or cause denial of service. This paper introduces the background, concepts and properties of Hardware Trojan. And then it analyzes the research status at home and abroad. Combined with cases of Hardware Trojan, this paper introduces its common classification, the general detection methods as well as their advantages and disadvantages. What's more, it applies typical cases to illustrate the features of each safety measure of Hardware Trojan. Finally, it puts forward the research direction and emphasis of Hardware Trojan after summarizing the existing problems in current researches.
Key words:  Hardware Trojan  design  detection  security approach