{"title":"AES加密电路中硬件木马的一种有效触发方法","authors":"Xin Chuan, Yingjian Yan, Yi-lun Zhang","doi":"10.1109/ICAM.2017.8242145","DOIUrl":null,"url":null,"abstract":"The cryptographic chip is widely used in government, military, finance, business and other fields, so the requirement of security is very high. The globalization of the integrated circuit supply chains has promoted the rapid development of the industry, but the chip is also vulnerable to malicious modified by the attacker, namely hardware Trojan implanted. The paper proposed a hardware Trojan efficient triggering method in AES cryptographic circuit. The method generated the test vector set by using the proposed optimal expand algorithm, which was used for detecting the AES cryptographic circuit to judge whether AES circuit exist hardware Trojans. Experiment results indicate that the method proposed in this paper can effectively trigger the hardware Trojan, increase the number of hardware Trojans triggered, and improve the trigger efficiency of the hardware Trojan. Thus, it is an efficient triggering method for detecting combinational hardware Trojans in AES Cryptographic circuit.","PeriodicalId":117801,"journal":{"name":"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"An efficient triggering method of hardware Trojan in AES cryptographic circuit\",\"authors\":\"Xin Chuan, Yingjian Yan, Yi-lun Zhang\",\"doi\":\"10.1109/ICAM.2017.8242145\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cryptographic chip is widely used in government, military, finance, business and other fields, so the requirement of security is very high. The globalization of the integrated circuit supply chains has promoted the rapid development of the industry, but the chip is also vulnerable to malicious modified by the attacker, namely hardware Trojan implanted. The paper proposed a hardware Trojan efficient triggering method in AES cryptographic circuit. The method generated the test vector set by using the proposed optimal expand algorithm, which was used for detecting the AES cryptographic circuit to judge whether AES circuit exist hardware Trojans. Experiment results indicate that the method proposed in this paper can effectively trigger the hardware Trojan, increase the number of hardware Trojans triggered, and improve the trigger efficiency of the hardware Trojan. Thus, it is an efficient triggering method for detecting combinational hardware Trojans in AES Cryptographic circuit.\",\"PeriodicalId\":117801,\"journal\":{\"name\":\"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)\",\"volume\":\"103 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAM.2017.8242145\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd IEEE International Conference on Integrated Circuits and Microsystems (ICICM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAM.2017.8242145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient triggering method of hardware Trojan in AES cryptographic circuit
The cryptographic chip is widely used in government, military, finance, business and other fields, so the requirement of security is very high. The globalization of the integrated circuit supply chains has promoted the rapid development of the industry, but the chip is also vulnerable to malicious modified by the attacker, namely hardware Trojan implanted. The paper proposed a hardware Trojan efficient triggering method in AES cryptographic circuit. The method generated the test vector set by using the proposed optimal expand algorithm, which was used for detecting the AES cryptographic circuit to judge whether AES circuit exist hardware Trojans. Experiment results indicate that the method proposed in this paper can effectively trigger the hardware Trojan, increase the number of hardware Trojans triggered, and improve the trigger efficiency of the hardware Trojan. Thus, it is an efficient triggering method for detecting combinational hardware Trojans in AES Cryptographic circuit.