Font Size: a A A

Research On Information Leakage Hardware Trojan And Hardware Trojan Detection Method

Posted on:2020-08-12Degree:MasterType:Thesis
Country:ChinaCandidate:J W LiFull Text:PDF
GTID:2428330596976360Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the wide application of electronic products and the rise of artificial intelligence and Internet of Things in recent years,the scale of integrated circuit industry is becoming larger and larger,and the security of integrated circuits has attracted more and more attention.This paper studies the Hardware Trojan in the field of integrated circuit security,designs three kinds of Hardware Trojans,which are privilege-seizing,high frequency channel and electromagnetic emission.Then we analyses the concealment of the three kinds of Hardware Trojans under various mainstream detection methods.After that,the Hardware Trojans we designed is improved through the research of detection methods.In this paper,the electromagnetic emission Hardware Trojan is detected by the side-channel analysis method on the electromagnetic radiation.A functional analysis detection method is also proposed to detect this kind of Hardware Trojan,which is particularly efffective.Finally,this paper preliminarily completed the construction of information leakage Hardware Trojan detection platform.Firstly,we introduce the background and the research status home and abroad of Hardware Trojan and Hardware Trojan detection technology.Then,Hardware Trojan and the detection and protection technology of Hardware Trojan are briefly introduced and analyzed.Then,the AES encryption platform under attack and its RS232 data transmission serial port are introduced and analyzed in detail,and the encryption platform is implemented on the development board of FPGA.In this paper,three kinds of information leakage Hardware Trojans are designed on the AES-128 encryption circuit.They have different triggering modes and leaking channels,covering almost all types of information leaking Hardware Trojans.We analyze the concealment of this type of Hardware Trojan under side channel analysis,logic detection and feature extraction detection methods.In this paper,we use side channel analysis and functional analysis to detect the Hardware Trojans we designed.The concept of functional analysis is first proposed as a Hardware Trojan detection method.We improved the Hardware Trojans mentioned above after studying the detection method.Finally,this paper preliminarily completed the information leakage Hardware Trojan detection platform,which has a high success rate for this kind of Hardware Trojan detection.
Keywords/Search Tags:Hardware Trojans, Information leakage, FPGA, Hardware Trojans detection
PDF Full Text Request
Related items