Font Size: a A A

Detection Of Hardware Trojan Based On FPGA

Posted on:2014-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:H XieFull Text:PDF
GTID:2248330398457313Subject:Integrated circuit engineering
Abstract/Summary:PDF Full Text Request
At present, the integrated circuit chip has penetrated into every field of modern science and technology, promote the development of science and technology plays an increasingly large role, at the same time, attacks against chips are increasingly common. For example, the chip design and manufacturing process of phase separation of this trend, leading the chip manufacturing process outsourcing risks, part of the untrusted manufacturer may change the original design chip, embedded in the so-called "hardware Trojan circuit", and in the specific trigger activation conditions to achieve destructive features or leak secret information inside the chip, because the chip hardware design for Trojan attacks can affect a large number of devices and detection difficult, so the "hardware Trojan" is considered a major threat to all security model.This paper first introduces the concept of hardware Trojan horse and its basic principle and development status at home and abroad; According to certain classification standard, then details the hardware Trojan classification; Then explore the hardware Trojan embedded way; Finally introduced the hardware Trojan detection method.This paper studies completed work include:1. Complete hardware Trojan detection platform design, including overall design, hardware design and software part of the design. The platform consists of three parts:PC, oscilloscope and the FPGA chip as the core of the PCB detection plate. Detection platform software components that Verilog language description logic.2. The detection platform FPGA chip is designed and implemented AES encryption target circuit and an electromagnetic type leakage hardware Trojans.Using Verilog HDL language of the original AES encryption algorithm circuit128through the serial input plaintext and the key, the output128ciphertext. View output128-bit ciphertext can determine AES circuit is correct. In the original circuit implanted AES hardware Trojans, Trojan128-bit key can be leaked through electromagnetic, in a certain distance, ordinary radios can receive128of the key information. Therefore, we can conclude that:the design of electromagnetic leakage Trojan hidden and successful steal secret information.3. Based on LabVIEW to develop automated test platform. The platform can automatically send and receive plaintext, key and cipherlext. the FPGA chip power consumption data is automatically collected and saved to excel in. The automatic test platform can reduce anthropogenic interference experiments and mistakes, improve efficiency of the experiment.4Based on multi-parameter Trojan hardware detection method studied, carried out hardware Trojan detection experiments on the platform. The detection method will supply current of the transistor chip operating frequency associated with the use of the links between them to aid in the detection of hardware Trojans.Hardware Trojan detection experimental results showed that:this type of hardware to achieve electromagnetic leakage Trojan accounting for the overall logic unit area of1.7%, with better concealment, and can be AES128-bit key encryption circuit was successfully launched by a solenoid leak; the use of multi-parameter-based hardware Trojan detection method can be successfully detected the hardware Trojan detection resolution up to10-2, which can contain Trojan chips successfully separated.
Keywords/Search Tags:Hardware Trojan, FPGA, Detection, Chip Security
PDF Full Text Request
Related items