【打印本页】      【下载PDF全文】   View/Add Comment  Download reader   Close
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 1355次   下载 1121 本文二维码信息
码上扫一扫!
RTL级硬件木马问题研究
赵剑锋,史岗
分享到: 微信 更多
(中国科学院大学 网络空间安全学院 北京 中国 100049;中国科学院信息工程研究所 第五实验室 北京 中国 100093)
摘要:
信息时代使得信息安全变得日益重要。信息安全可以分为两类:软件安全和硬件安全。攻击方为了获取想要的信息,除了使用软件方面的手段,如病毒、蠕虫、软件木马等,同样也使用硬件手段来威胁设备、系统和数据的安全,如在芯片中植入硬件木马等。如果将硬件木马植入信息处理的核心——处理器,那将风险更高、危害更大。然而,硬件木马位于信息系统底层核心的层面,难以被检测和发现出来。硬件木马是国内外学术界研究的热点课题,尤其是在设计阶段结合源代码的硬件木马检测问题,是新问题,也是有实际需要的问题。在上述背景并结合国内对芯片RTL源代码安全风险评估的实际需求展开了相关工作,围绕RTL源代码中硬件木马的问题展开了研究。主要贡献:针对RTL级硬件木马尚未在学术上给出一般属性的问题,给出硬件木马的属性描述形式,在形成硬件木马属性的基础上,以模块端口信号为源,提出了一种基于信号流向的多叉树分层递归搜索方法,实验结果表明,该方法对于依附在端口上的硬件木马的检测是有效的。
关键词:  芯片|RTL级硬件木马|属性描述|搜索方法
DOI:10.19363/J.cnki.cn10-1380/tn.2023.07.10
Received:March 07, 2020Revised:April 20, 2020
基金项目:本课题得到国家“核高基”科技重大专项基金项目(No. 2013ZX01029003-001); 国家“八六三”高技术研究发展计划基金项目(No.2012AA01A401)资助。
Research on RTL level hardware Trojan
Zhao Jianfeng,Shi Gang
School of Cybersecurity, University of Chinese Academy of Sciences, Beijing, 100049, China;Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Abstract:
With the advent of the information age, information security has become increasingly important. Information security can be divided into two categories, Software security and hardware security. In order to obtain the desired information, attackers not only use software means, such as viruses, worms, software Trojans, but also use hardware means to threaten the security of devices, systems and data, such as hardware Trojans embedded in chips. If the hardware Trojan horse is embedded in the processor, which is the core of information processing, the risk will be higher and the harm will be greater. However, the hardware Trojan horse is located at the bottom of the information system core level, which is difficult to detect and discover. Hardware Trojan is a hot topic in academic circles at home and abroad. Especially in the design stage, the problem of hardware Trojan detection combined with source code is not only a new problem, but also a necessary one. This paper is based on the above background and combined with the actual needs of domestic chip RTL source code security risk assessment to carry out related work, mainly for the detection and verification of hardware Trojan in RTL source code. The main contents and contributions of this paper are as follows. Aiming at the problem that RTL level hardware Trojan has not yet given its characteristic attributes academically, the description form of hardware Trojan’s attribute is given, and a clustering analysis method based on unsupervised learning is proposed to form the definition of hardware Trojan’s attributes, i.e. intrinsic attributes, including structural features, and external attributes, including triggering mode, location and harmful results. It provides a basis for the detection and verification of hardware Trojan. On the Basis of Forming Hardware Trojan Attribute, a hierarchical recursive search method based on multi-tree of signal flow direction is proposed. The experimental results show that the method is effective for the detection of hardware Trojan attached to ports.
Key words:  chip|RTL level hardware trojan|attribute description|search method