• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Xiao, Yuxuan (Xiao, Yuxuan.) | Feng, Shiwei (Feng, Shiwei.) (学者:冯士维)

收录:

EI

摘要:

The FPGA can customize the array of internal logic at will, and can be programmed in real time at the user's site to modify the internal hardware logic to achieve any logic function. This is impossible for ASIC and DSP. In this setting, hardware Trojan is a malicious circuit intentionally implanted in a chip or electronic system or a defective module left unintentionally by the designer. Under special conditions, the module can be used by attackers to achieve destructive functions. The inserted hardware Trojan may cause information leakage, change the circuit function, and even destroy the circuit. In this paper, we use Ring Oscillator (RO) to construct a ring oscillator network (RON) and monitor the power supply of whole FPGA device. This method applies the frequency of the ring oscillator as a sensitive factor to facilitate the non-destructive detection of the location of the Trojan. © 2020 IEEE.

关键词:

Computer hardware Field programmable gate arrays (FPGA) Hardware security Malware Rings (components) Software engineering

作者机构:

  • [ 1 ] [Xiao, Yuxuan]Beijing University of Technology, China
  • [ 2 ] [Feng, Shiwei]Beijing University of Technology, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

年份: 2020

页码: 410-413

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 1

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:1377/3636944
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司