引用本文
  • 张宁,吕志强,张焱琳,黄伟庆.基于网表控制流分析的硬件木马检测方法[J].信息安全学报,已采用    [点击复制]
  • ZHANG Ning,LV Zhiqiang,ZHANG Yanlin,HUANG Weiqing.A Novel Hardware Trojan Detection Method based on the Controllability Flow Analysis of the netlist[J].Journal of Cyber Security,Accept   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

过刊浏览    高级检索

本文已被:浏览 725次   下载 110  
基于网表控制流分析的硬件木马检测方法
张宁, 吕志强, 张焱琳, 黄伟庆
0
(中国科学院信息工程研究所 第四研究室 北京 中国)
摘要:
在现代集成电路设计中,随着芯片规模的不断扩大,越来越多的功能集成其中,不可避免的引入很多第三方设计的IP核,导致在芯片设计阶段可能引入具有恶意功能的电路,即硬件木马。因此,针对IP核进行硬件木马检测可以降低芯片设计中引入的风险。现有的硬件木马检测方法通常通过硬件木马的某一特征进行检测,容易被攻击者针对性抵抗。在本文中,提出了一种新型的建模方法将电路转为节点控制流图,并基于控制流分析进行硬件木马检测,同时分析组合逻辑电路和时序逻辑电路。实验结果表明,对于常见的硬件木马和新型抗检测硬件木马,该检测方法都可以达到很高的准确性。更重要的是,本文将被检测网表抽象为节点控制流图,对于未来出现的硬件木马,可以基于此图添加新的特征分析进行扩展。
关键词:  芯片安全,硬件木马检测,网表,控制流图,特征分析
DOI:10.19363/J.cnki.cn10-1380/tn.2023.08.01
投稿时间:2020-12-14修订日期:2021-02-22
基金项目:
A Novel Hardware Trojan Detection Method based on the Controllability Flow Analysis of the netlist
ZHANG Ning, LV Zhiqiang, ZHANG Yanlin, HUANG Weiqing
(Institute of Information Engineering,Chinese Academy of Sciences)
Abstract:
With the expansion of modern integrated circuit (IC) scale, it’s inevitable to introduce many intellectual property (IP) cores designed by the third party, leading to the potential insertion of malicious circuits called Hardware Trojans(HT). Thus, HT detections are essential to mitigate the thread of HT which may be inserted during the IC design flow. Existing HT detection methods are usually rely on a particular character of HT, which are easy resisted by novel implicitly designs. In this paper, we propose a general modeling method of designs, which transform the netlist to a Node Controllability Flow Graph (NCFG), and a novel HT detection method based on the controllability flow analysis considering both combinational and sequential logics. The experiment result shows that it has high accuracy to common HT and novel implicitly HT. Moreover, it has advantages to be extended for future stealthier HT features analysis based on NCFG.
Key words:  chip security  Hardware Trojan detection  netlist  Controllability Flow  feature analysis