摘要: |
由于集成电路的设计制造技术越来越复杂,使得芯片在设计及生产过程中充满潜在的威胁,即有可能被加入硬件木马。硬件木马有可能改变系统功能,泄漏重要信息,毁坏系统或造成拒绝服务等危害。文章系统的介绍了硬件木马的产生背景、概念及性质、国内外研究现状,对国内外研究现状进行了分析比较;介绍了硬件木马的常见分类方式,并结合实例加以说明;常用的检测方法分类,并结合案例,说明各种检测方法的优缺点;介绍了硬件木马的安全防范措施,结合案例说明各种防范措施的特点;最后总结全文,指出现有研究存在的问题,并展望了硬件木马的研究方向与重点。 |
关键词: 硬件木马 设计 检测 安全措施 |
DOI:10.19363/j.cnki.cn10-1380/tn.2017.01.006 |
Received:September 19, 2016Revised:November 15, 2016 |
基金项目:本课题得到国家“核高基”科技重大专项基金项目(No.2013ZX01029003-001);国家“八六三”高技术研究发展计划基金项目(No.2012AA01A401)资助。 |
|
A Survey on the studies of Hardware Trojan |
ZHAO Jianfeng,SHI Gang |
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China |
Abstract: |
With the increasing complexity of IC design and fabrication, IC design and fabrication is endangered by potential threat like the inserted Hardware Trojan. Hardware Trojan may change the function of system, lead to the leakage of important information, damage the system or cause denial of service. This paper introduces the background, concepts and properties of Hardware Trojan. And then it analyzes the research status at home and abroad. Combined with cases of Hardware Trojan, this paper introduces its common classification, the general detection methods as well as their advantages and disadvantages. What's more, it applies typical cases to illustrate the features of each safety measure of Hardware Trojan. Finally, it puts forward the research direction and emphasis of Hardware Trojan after summarizing the existing problems in current researches. |
Key words: Hardware Trojan design detection security approach |