An efficient triggering method of hardware Trojan in AES cryptographic circuit

Xin Chuan, Yingjian Yan, Yi-lun Zhang
{"title":"An efficient triggering method of hardware Trojan in AES cryptographic circuit","authors":"Xin Chuan, Yingjian Yan, Yi-lun Zhang","doi":"10.1109/ICAM.2017.8242145","DOIUrl":null,"url":null,"abstract":"The cryptographic chip is widely used in government, military, finance, business and other fields, so the requirement of security is very high. The globalization of the integrated circuit supply chains has promoted the rapid development of the industry, but the chip is also vulnerable to malicious modified by the attacker, namely hardware Trojan implanted. The paper proposed a hardware Trojan efficient triggering method in AES cryptographic circuit. The method generated the test vector set by using the proposed optimal expand algorithm, which was used for detecting the AES cryptographic circuit to judge whether AES circuit exist hardware Trojans. Experiment results indicate that the method proposed in this paper can effectively trigger the hardware Trojan, increase the number of hardware Trojans triggered, and improve the trigger efficiency of the hardware Trojan. Thus, it is an efficient triggering method for detecting combinational hardware Trojans in AES Cryptographic circuit.","PeriodicalId":117801,"journal":{"name":"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAM.2017.8242145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

The cryptographic chip is widely used in government, military, finance, business and other fields, so the requirement of security is very high. The globalization of the integrated circuit supply chains has promoted the rapid development of the industry, but the chip is also vulnerable to malicious modified by the attacker, namely hardware Trojan implanted. The paper proposed a hardware Trojan efficient triggering method in AES cryptographic circuit. The method generated the test vector set by using the proposed optimal expand algorithm, which was used for detecting the AES cryptographic circuit to judge whether AES circuit exist hardware Trojans. Experiment results indicate that the method proposed in this paper can effectively trigger the hardware Trojan, increase the number of hardware Trojans triggered, and improve the trigger efficiency of the hardware Trojan. Thus, it is an efficient triggering method for detecting combinational hardware Trojans in AES Cryptographic circuit.
AES加密电路中硬件木马的一种有效触发方法
加密芯片广泛应用于政府、军事、金融、商业等领域,因此对安全性的要求非常高。集成电路供应链的全球化推动了行业的快速发展,但芯片也容易受到攻击者的恶意修改,即植入硬件木马。提出了一种用于AES加密电路的硬件木马高效触发方法。该方法利用所提出的最优展开算法生成测试向量集,用于检测AES加密电路,判断AES电路是否存在硬件木马。实验结果表明,本文提出的方法可以有效地触发硬件木马,增加硬件木马的触发次数,提高硬件木马的触发效率。因此,它是一种检测AES加密电路中组合硬件木马的有效触发方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信