南京大学学报(自然科学版) ›› 2020, Vol. 56 ›› Issue (2): 264–269.doi: 10.13232/j.cnki.jnju.2020.02.012

• • 上一篇    下一篇

基于高斯滤波和K最邻近算法融合的硬件木马电磁信息检测技术研究

王品,赵毅强(),刘燕江,何家骥,马浩诚   

  1. 天津大学微电子学院,天津,300072
  • 收稿日期:2019-09-10 出版日期:2020-03-30 发布日期:2020-04-02
  • 通讯作者: 赵毅强 E-mail:yq_zhao@tju.edu.cn
  • 基金资助:
    国家自然科学基金重点基金(61832018)

Hardware Trojan electromagnetic information detection based on fusion of Gaussian filter and K⁃nearest neighbour algorithm

Pin Wang,Yiqiang Zhao(),Yanjiang Liu,Jiaji He,Haocheng Ma   

  1. School of Microelectronics,Tianjin University,Tianjin,300072,China
  • Received:2019-09-10 Online:2020-03-30 Published:2020-04-02
  • Contact: Yiqiang Zhao E-mail:yq_zhao@tju.edu.cn

摘要:

电磁侧信道信息具有非接触、三维矢量、空间及频谱信息丰富等优点,可以进一步提高硬件木马的检测效率,基于电磁侧信道分析的硬件木马检测技术逐渐成为主流方法.因此,以电磁侧信道信息为研究对象,融合高斯滤波算法和K最邻近算法提取并识别出硬件木马的微小特征,建立高精度微米级集成电路电磁侧信道采集平台,并采集敏感区域的电磁侧信道信息.利用高斯算法自适应地滤除测试中的高斯噪声影响,借助K最邻近算法的相似度测度来提取硬件木马的特征.实验结果表明,提出的检测方法可以有效地检测出面积占比为0.76%的硬件木马.

关键词: 集成电路, 硬件木马, 电磁信息, 高斯滤波, K最邻近算法

Abstract:

Electromagnetic information has many advantages over others,such as non?contact,three?dimensional vector,rich in spatial and frequency information,etc. It could improve the detection efficiency of hardware Trojan,and the detection technology based on electromagnetic information is becoming a main method. Therefore,this paper takes the electromagnetic side?channel signal as the research object,combines the Gaussian filtering algorithm with the K?nearest neighbor algorithm to distinguish the tiny features of the hardware Trojan. The high?precision micro?scale electromagnetic information acquisition platform is established,then applied to collecting the electromagnetic information of the sensitive area. Gaussian algorithm is used to filter out the Gaussian noise adaptively,and the similarity measure of the K?nearest neighbor algorithm is used to extract the characteristics of the hardware Trojan. The experimental results show that the proposed detection method could effectively detect hardware Trojan with an area ratio of 0.76%.

Key words: integrated circuit, hardware Trojan, electromagnetic information, Gaussian filter, K?nearest neighbour algorithm

中图分类号: 

  • TP274

图1

硬件木马检测平台框架"

图2

硬件木马检测流程"

图3

数据降噪处理"

图4

硬件木马检测结果:K最邻近算法(左);主成分分析算法(右)"

1 Chen X M,Liu Q Y,Yao S,et al. Hardware Trojan detection in third?party digital intellectual property cores by multilevel feature analysis. IEEE Transactions on Computer?Aided Design of Integrated Circuits and Systems,2018,37(7):1370-1383.
2 He J J,Guo X L,Meade T,et al. SoC interconnection protection through formal verification. Integration,2019,64:143-151.
3 Reece T,Robinson W H. Detection of Hardware trojans in third?party intellectual property using untrusted modules. IEEE Transactions on Computer?Aided Design of Integrated Circuits and Systems,2016,35(3):357-366.
4 Hamdioui S,Danger J L,Natale G D,et al. Hacking and protecting IC hardware∥2014 Design,Automation & Test in Europe Conference & Exhibition. Dresden,Germany:IEEE,2014:1-7.
5 Jacob N,Merli D,Heyszl J,et al. Hardware Trojans:current challenges and approaches. IET Computers & Digital Techniques,2014,8(6):264-273.
6 Bao C X,Forte D,Srivastava A. On reverse engineering?based hardware Trojan detection. IEEE Transactions on Computer?Aided Design of Integrated Circuits and Systems,2016,35(1):49-57.
7 Huang Y W,Bhunia S,Mishra P. MERS:statistical test generation for side?channel analysis based Trojan detection∥Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna,Austria:ACM,2016:130-141.
8 Ngo X T,Najm Z,Bhasin S,et al. Method taking into account process dispersion to detect Hardware Trojan Horse by side?channel analysis. Journal of Cryptographic Engineering,2016,6(3):239-247.
9 Amelian A,Borujeni S E. A side?channel analysis for hardware Trojan detection based on path delay measurement. Journal of Circuits,Systems and Computers,2018,27(9):1229-1247.
10 Huang Y W,Bhunia S,Mishra P. Scalable test generation for trojan detection using side channel analysis. IEEE Transactions on Information Forensics and Security,2018,13(11):2746-2760.
11 Shende R,Ambawade D D. A side channel based power analysis technique for hardware trojan detection using statistical learning approach∥2016 13thThirteenth International Conference on Wireless and Optical Communications Networks. Hyderabad,India:IEEE,2016:1-4.
12 Gunti N B,Lingasubramanian K. Efficient static power based side channel analysis for Hardware Trojan detection using controllable sleep transistors∥SoutheastCon 2015. Fort Lauderdale, FL, USA:IEEE, 2015:1-6.
13 Balasch J, Gierlichs B, Verbauwhede I. Electromagnetic circuit fingerprints for Hardware Trojan detection∥2015 IEEE International Symposium on Electromagnetic Compatibility. Dresden,Germany:IEEE,2015:246-251.
14 He J J,Zhao Y Q,Guo X L,et al. Hardware Trojan detection through chip?free electromagnetic side?channel statistical analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2017,25(10): 2939-2948.
15 He J J,Liu Y J,Yuan Y D,et al. Golden chip free Trojan detection leveraging electromagnetic side channel fingerprinting. IEICE Electronics Express,2019,16(2): 1-8.
16 张阳,全厚德,李雄伟等. 基于多元正态分析的硬件木马检测研究. 华中科技大学学报(自然科学版),2018,46(1): 17-21.
Zhang Y,Quan H D,Li X W, et al. Detection of hardware Trojan based on multiple normal distribution analysis. Journal of Huazhong University of Science and Technology (Nature Science Edition),2018,46(1): 17-21.
17 靳取,方晖,柏业超. 基于GPIB的数字电路自动测试系统研究. 南京大学学报(自然科学),2016,52(6): 1133-1138.
Jin Q,Fang H,Bai Y C.Research of an automatic digital circuit test system based on GPIB. Journal of Nanjing University (Natural Science),2016,52(6): 1133-1138.
[1] 李丽*,张宇昂,傅玉祥,潘红兵,韩峰. 三维众核片上处理器存储架构研究[J]. 南京大学学报(自然科学版), 2014, 50(3): 330-.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 马益平,严浩军,王琼京,赵亚云,张秋菊,孔春龙. 混合配体法合成氨基MIL⁃101(Cr)及其二氧化碳吸附和除湿性能[J]. 南京大学学报(自然科学版), 2019, 55(5): 840 -849 .
[2] 李勤,陆现彩,张立虎,程永贤,刘鑫. 蒙脱石层间阳离子交换的分子模拟[J]. 南京大学学报(自然科学版), 2019, 55(6): 879 -887 .
[3] 张家精,夏巽鹏,陈金兰,倪友聪. 基于张量分解和深度学习的混合推荐算法[J]. 南京大学学报(自然科学版), 2019, 55(6): 952 -959 .
[4] 洪佳明,黄云,刘少鹏,印鉴. 具有结果多样性的近似子图查询算法[J]. 南京大学学报(自然科学版), 2019, 55(6): 960 -972 .
[5] 徐媛媛,张恒汝,闵帆,黄雨婷. 三支交互推荐[J]. 南京大学学报(自然科学版), 2019, 55(6): 973 -983 .
[6] 王宝丽,姚一豫. 信息表中约简补集对及其一般定义[J]. 南京大学学报(自然科学版), 2020, 56(4): 461 -468 .