{"title":"一种用于安全芯片中硬件木马防护的片上系统总线结构","authors":"L. Changlong, Z. Yiqiang, Shi Yafeng, Gao Xingbo","doi":"10.1109/EDSSC.2011.6117727","DOIUrl":null,"url":null,"abstract":"Hardware Trojan, similar to the computer viruses, is a new threat in modern System-On-Chips (SOCs) such as security chips and trusted computer systems. Despite the risks that such an attack entails, little attention has been given to the methods of run-time Trojan detection. In this paper, the defects in existing security chips are analyzed and an improved bus architecture for hardware Trojan protection is presented, which can prevent data from runtime Trojan attacking in the digital circuits. A novel bus controller and random number generator (RNG) are used to implement the mechanism and the experimental results shows that the structure is efficient at thwarting the leaking of confidential information and signals.","PeriodicalId":6363,"journal":{"name":"2011 IEEE International Conference of Electron Devices and Solid-State Circuits","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A System-On-Chip bus architecture for hardware Trojan protection in security chips\",\"authors\":\"L. Changlong, Z. Yiqiang, Shi Yafeng, Gao Xingbo\",\"doi\":\"10.1109/EDSSC.2011.6117727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hardware Trojan, similar to the computer viruses, is a new threat in modern System-On-Chips (SOCs) such as security chips and trusted computer systems. Despite the risks that such an attack entails, little attention has been given to the methods of run-time Trojan detection. In this paper, the defects in existing security chips are analyzed and an improved bus architecture for hardware Trojan protection is presented, which can prevent data from runtime Trojan attacking in the digital circuits. A novel bus controller and random number generator (RNG) are used to implement the mechanism and the experimental results shows that the structure is efficient at thwarting the leaking of confidential information and signals.\",\"PeriodicalId\":6363,\"journal\":{\"name\":\"2011 IEEE International Conference of Electron Devices and Solid-State Circuits\",\"volume\":\"1 1\",\"pages\":\"1-2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Conference of Electron Devices and Solid-State Circuits\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDSSC.2011.6117727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference of Electron Devices and Solid-State Circuits","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDSSC.2011.6117727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A System-On-Chip bus architecture for hardware Trojan protection in security chips
Hardware Trojan, similar to the computer viruses, is a new threat in modern System-On-Chips (SOCs) such as security chips and trusted computer systems. Despite the risks that such an attack entails, little attention has been given to the methods of run-time Trojan detection. In this paper, the defects in existing security chips are analyzed and an improved bus architecture for hardware Trojan protection is presented, which can prevent data from runtime Trojan attacking in the digital circuits. A novel bus controller and random number generator (RNG) are used to implement the mechanism and the experimental results shows that the structure is efficient at thwarting the leaking of confidential information and signals.