Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2015, Vol. 38 ›› Issue (4): 133-137.doi: 10.13190/j.jbupt.2015.04.026

• Reports • Previous Articles    

Detection Method of Hardware Trojans Power Consumption

ZHAO Zhi-xun1, NI Lin2, LI Shao-qing1   

  1. 1. College of Computer, National University of Defense Technology, Changsha 410073, China;
    2. Xi'an Communications College, Xi'an 710106, China
  • Received:2014-11-10 Online:2015-08-28 Published:2015-08-28

Abstract:

A new chip power consume model was built. The model presents an effective way to reduce the influence of process variation. The power contrast model between UTC and GOLDEN was given. The approach on S-box circuit in advanced encryption standard(AES) algorithm was evaluated. It is shown that the proposed scheme can highly eliminate noise and detect hardware Trojans.

Key words: hardware Trojan, feature extraction, overlapping examine

CLC Number: