计算机工程与应用 ›› 2020, Vol. 56 ›› Issue (6): 73-78.DOI: 10.3778/j.issn.1002-8331.1904-0275

• 理论与研发 • 上一篇    下一篇

针对电路关键路径的硬件木马监测与防护

张浩宇,应健锋,宋晨钰,王可可,易茂祥   

  1. 合肥工业大学 电子科学与应用物理学院,合肥 230009
  • 出版日期:2020-03-15 发布日期:2020-03-13

Hardware Trojan Monitoring and Protection for Circuit Critical Path

ZHANG Haoyu, YING Jianfeng, SONG Chenyu, WANG Keke, YI Maoxiang   

  1. School of Electronic Science and Applied Physics, Hefei University of Technology, Hefei 230009, China
  • Online:2020-03-15 Published:2020-03-13

摘要:

随着半导体产业的快速发展,硬件木马已经对集成电路的可靠性和安全性带来了巨大的隐患。现有的研究表明,电路的关键路径易受到硬件木马的攻击。针对电路的关键路径提出了预防硬件木马插入的实时监测方案。根据电路的拓扑逻辑顺序计算电路各个路径的延时,选取电路延时最大的路径作为电路的关键路径,计算关键路径上所有节点的转换概率,优先选择关键路径上低于特定阈值的节点进行监测器设计。同只检测电路主输出的逻辑测试法相比,充分考虑了关键路径上硬件木马的激活不改变主输出的情况。实验结果表明,该方案在最多增加24.32%的面积开销下,可以有效地预防和监测硬件木马在ISCAS85电路关键路径的插入。

关键词: 硬件木马, 关键路径, 关键节点, 监测器

Abstract:

With the rapid development of the semiconductor industry, hardware Trojans have brought huge hidden dangers to the reliability and security of integrated circuits. Existing research shows that the critical path of the circuit is more vulnerable to hardware Trojan attacks. A real-time monitoring scheme for preventing hardware Trojan insertion is proposed for the critical path of the circuit. The delay of each path of the circuit is calculated according to the topological logic sequence of the circuit, and the path with the largest delay of the circuit is selected as the critical path of the circuit. The conversion probability of all nodes on the critical path is calculated. The nodes below the specific threshold on the critical path are selected to use the monitor design. Compared with the logic test method that only detects the main output of the circuit, fully consideration is given for the activation of the hardware Trojan on the critical path doesn’t change the main output. The experimental results show that the scheme can effectively prevent and monitor the insertion of hardware Trojans in the critical path of the circuit with an increase of 24.32% area overhead for the most.

Key words: hardware Trojans, critical path, critical node, monitor