[1] | AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan Detection Using IC Fingerprinting[C/OL].[2017-03-02].http://ece-research.unm.edu/jimp/HOST/papers/Sunar_trojans.pdf.DOI:10.1109/sp.2007.36
|
[2] | WIKIPEDIA FOUNDATION INC.Secure Cryptoprocessor Definition.[EB/OL].[2016-05-04].https://en.wikipedia.org/wiki/Secure_cryptoprocessor.
|
[3] | BOND M,CHOUDARY O,MURDOCH SJ,et al.Chip and Skim:Cloning EMV Cards with the Pre-Play Attack[C/OL].[2017-05-02].https://www.researchgate.net/publication/230839731_Chip_and_Skim_Cloning_EMV_Cards_with_the_Pre-play_Attack.DOI:10.1109/sp.2014.11.
|
[4] | KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Annual International Cryptology Conference.Heidelberg:Springer,1999:388-397.
|
[5] | ROHATGI P.Improved techniques for side-channel analysis[M]//Cryptographic Engineering.Boston:Springer,2009:381-406.
|
[6] | CAI F,BAI G,LIU H,et al.Optical Fault Injection Attacks for Flash Memory of Smartcards[C]//Electronics In f ormation and Emergency Communication(ICEIEC),2016 6th International Conference on.Washington D C:IEEE,2016:46-50.DOI:10.1109/iceiec.2016.7589684.
|
[7] | EESEMI.Microprobing[EB/OL].[2017-09-20].http://eesemi.com/microprobing.htm.
|
[8] | CHEN Y,VENKATESAN R,CARY M,et al.Oblivious hashing:A stealthy software integrity verification primitive[C]//Information Hiding.Heidelberg:Springer,2003:400-414.
|
[9] | SUH G E,O'DONNELL C W,DEVADAS S.AEGIS:A single-chip secure processor[J].Information Security Technical Report,2005,10(2):63-73.DOI:10.1016/j.istr.2005.05.002.
|
[10] | CORON J S,ROY A,VIVEK S.Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures[J].Journal of Cryptographic Engineering,2015,5(2):73-83.DOI:10.1007/s13389-015-0099-9.
|
[11] | EGELE M,KRUEGEL C,KIRDA E,et al.PiOS:Detecting privacy leaks in iOS applications[J].Network&Distributed System Security Symposium,2011,1:280-291.
|
[12] | MALIK S,BECKER G T,PAAR C,et al.Development of a layout-level hardware obfuscation tool[C]//VLSI(ISVLSI),2015 IEEE Computer Society Annual Symposium on.Washington D C:IEEE,2015:204-209.DOI:10.1109/isvlsi.2015.118.
|
[13] | ARIAS O,SULLIVAN D,JIN Y.HA2lloc:Hardware-assisted secure allocator[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy.New York:ACM,2017:8.DOI:10.1145/3092627.3092635.
|
[14] | DAVI L,HANREICH M,PAUL D,et al.HAFIX:Hardware-assisted flow integrity extension[C]//Proceedings o f the 52nd Annual Design Automation Conference.New York:ACM,2015:74.DOI:10.1145/2744769.2744847.
|
[15] | ALI S S,SAEED S M,SINANOGLU O,et al.Novel test-mode-only scan attack and countermeasure for compression-based scan architectures[J].IEEE Transactions on Computer-Aided Design o f Integrated Circuits and Systems,2015,34(5):808-821.DOI:10.1109/tcad.2015.2398423.
|
[16] | OWUSU E,GUAJARDO J,MCCUNE J,et al.OASIS:on achieving a sanctuary for integrity and secrecy on untrusted platforms[C]//Proceedings of the 2013ACM SIGSAC Con ference on Computer&Communications Security.New York:ACM,2013:13-24.DOI:10.1145/2508859.2516678.
|
[17] | GHOSH A K,SWAMINATHA T M.Software security and privacy risks in mobile e-commerce[J].Communications of the ACM,2001,44(2):51-57.DOI:10.1145/359205.359227.
|
[18] | LIU Y T,FAN R,TERZIJA V.Power system restoration:A literature review from 2006 to 2016[J].Journal of Modern Power Systems and Clean Energy,2016,4(3):332-341.DOI:10.1007/s40565-016-0219-2.
|
[19] | WAKSMAN A,SUOZZO M,SETHUMADHAVAN S.FANCI:Identification of Stealthy Malicious Logic UsingBoolean Functional Analysis[C/OL].[2017-06-02].http://www1.cs.columbia.edu/~simha/preprint_ccs13.pdf.DOI:10.1145/2508859.2516654.
|
[20] | LIU Y,JIN Y,MAKRIS Y.Hardware Trojans in wireless cryptographic ICs:Silicon demonstration&detection method evaluation[C]//Proceedings o f the International Con ference on Computer-Aided Design.Washington,D C:IEEE Press,2013:399-404.DOI:10.1109/iccad.2013.6691149.
|
[21] | CHAKRABORTY R S,WOLFF F G,PAUL S,et al.MERO:A statistical approach for hardware Trojan detection[C]//Cryptographic Hardware and Embedded Systems.Heidelberg:Springer,2009,5747:396-410.DOI:10.1007/978-3-642-04138-9_28.
|
[22] | AGRAWAL D,BAKTIR S,KARAKOYUNLU D,et al.Trojan detection using IC fingerprinting[C/OL].[2017-05-12].http://ece-re search.unm.edu/jimp/HOST/papers/Sunar_trojans.pdf,2007:296-310.DOI:10.1109/sp.2007.36.
|
[23] | STAMFORD.Gartner Says 6.4 Billion Connected"Things"Will Be in Use in 2016,Up 30 Percent From2015[EB/OL].[2015-11-10].http://www.gartner.com/newsroom/id/3165317.
|
[24] | MCMILLAN R.How Hackers Attack Cars[EB/OL].[2010-05-14].http://www.pcworld.com/article/196320/how_hackers_attack_cars.html.
|
[25] | KIM L W,VILLASENOR J D.Dynamic function replacement for system-on-chip security in the presence of hardware-based attacks[J].IEEE Transactions on Reliability,2014,63(2):661-675.DOI:10.1109/tr.2014.2316952.
|
[26] | YAROM Y,FALKNER K.FLUSH+RELOAD:A High Resolution,Low Noise,L3 Cache Side-Channel Attack[C/OL].[2017-02-03].https://www.usenix.org/system/files/conference/usen ixsecurity14/sec14-paper-yarom.pdf.
|
[27] | KIROVSKI D,DRINIC M,POTKONJAK M.Enabling Trusted Software Integrity[C/OL].[2017-06-02].http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/SWintegrity_Kirovsky.pdf.DOI:10.1145/635508.605409.
|
[28] | IMS Research.Global Smartphones Sales Will Top420 Million Devices in 2011[EB/OL].[2017-06-15].http://imsresearch.com/press-release/Global_Smartphones_Sales.
|
[29] | WESSEL S,STUMPF F,HERDT I,et al.Improving mobile device security with operating system-level virtualization[C]//IFIP/International In formation Security Conference.Berlin:Springer,2013:148-161.DOI:10.1007/978-3-642-39218-4_12.
|
[30] | CHEN W,XU L,LI G,et al.A lightweight virtualization solution for Android devices[J].IEEE Transactions on Computers,2015,64(10):2741-2751.DOI:10.1109/tc.2015.2389791.
|
[31] | ZHOU Y,JIANG X.Dissecting Android malware:Characterization and evolution[C]//Security and Privacy(SP),2012 IEEE Symposium on.Washington D C:IEEE,2012:95-109.DOI:10.1109/sp.2012.16.
|
[32] | ZHOU Y,WANG Z,ZHOU W,et al.Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[DB/OL].[2017-05-18]https://doi.org/http://www.internetsociety.org/hey-you-get-my-market-detecting-malicious-apps-official-and-alte rn ative-an droid-m arkets.
|
[33] | THAPLIYAL H,VARUN T S S,KUMAR S D.Adiabatic computing based low-power and DPA-resistant lightweight cryptography for IoT devices[C]//VLSI(ISVLSI),2017 IEEE Computer Society Annual Symposium on.Washington D C:IEEE,2017:621-626.DOI:10.1109/isvlsi.2017.115.
|
[34] | 冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18.FENG D G,ZHANG Y,ZHANG Y Q.Survey of information security risk assessment[J].Journal of China Institute o f Communications,2004,25(7):10-18(Ch).
|
[35] | 刘海峰,卿斯汉.安全操作系统审计的设计与实现[J].计算机研究与发展,2001,38(10):1262-1268.LIU H F,QIN S H.Design and realization of auditing in secure OS[J].Journal of Computer Research and Development,2001,38(10):1262-1268(Ch).
|
[36] | BARR M.Real men program in C[J].Embedded Systems Design,2009,22(7):3.
|
[37] | VAMOSIZHAN R.Embedded System Security[EB/OL].[2012-10-01].http://www.altera.com.cn/technology/systemdesign/articles/2012/embedded-security.html.
|
[38] | RAD R M,WANG X,TEHRANIPOOR M,et al.Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans[C/OL].[2017-02-03].http://ece-research.unm.edu/jimp/pubs/iccad2008_FIN AL_PAPER.pdf.DOI:10.1109/iccad.2008.4681643
|
[39] | JIN Y E,MAKRIS Y.Hardware Trojan Detection Using Path Delay Fingerprint[C/OL].[2017-03-05].http://www.eecs.ucf.edu/~jinyier/papers/HOST08.pdf.DOI:10.1109/hst.2008.4559049.
|
[40] | POTKONJAK M,NAHAPETIAN A,NELSON M,et al.Hardware Trojan Horse Detection Using GateLevel Characterization[C/OL].[2017-03-06].http://web.cs.ucla.edu/~ani/publications/%5bDAC2009%5dTrojanHorse.pdf.DOI:10.1145/1629911.1630091.
|
[41] | ALKABANI Y,KOUSHANFAR F.ConsistencyBased Characterization for IC Trojan Detection[C/OL].[2017-03-05].https://www.researchgate.net/publication/221626495_Consistency-based_characterization_for_IC_Trojan_detection.DOI:10.1145/1687399.1687426.
|
[42] | HU K Q,NOWROZ A N,REDA S,et al.High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization[C/OL].[2017-05-06].https://www.date-con ference.com/proceedings-archive/2017/pyear/PAPERS/2013/DATE13/PDFFILES/09.5_3.PDF.DOI:10.7873/date.2013.263.
|
[43] | WOLFF F,PAPACHRISTOU C,BHUNIA S,et al.Towards Trojan-Free Trusted ICs:Problem Analysis and Detection Scheme[C/OL].[2017-06-07].http://www.re sea rchgate.net/publication/221341443_Towards_Trojan-Free_Trusted_ICs_Problem_Analysis_and_Detection_Scheme.DOI:10.1109/date.2008.4484928.
|
[44] | RASTHOFER S,ARZT S,LOVAT E,et al.Droidforce:Enforcing complex,data-centric,system-wide policies in android[C]//ARES'14 Proceedings of the2014 Ninth International Con ference on Availability,Reliability and Security.Washington D C:IEEE Computer Society,2014:40-49.DOI:10.1109/ares.2014.13
|
[45] | WANG X,WANG Y,LIU L,et al.WrapDroid:Flexible and fine-grained scheme towards regulating behaviors of Android apps[C]//International Conference on In formation Security and Cryptology(LNCS8949).Cham:Springer International Publishing,2014:255-268.DOI:10.1007/978-3-319-15943-016.
|
[46] | 张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011.ZHANG H G,ZHAO B.Trusted Computing[M].Wuhan:Wuhan University Press,2011(Ch).
|
[47] | LEE R B,KWAN P,MCGREGOR J P,et al.Architecture for protecting critical secrets in microprocessors[C]//ACM SIGARCH Computer Architecture News.Washington D C:IEEE Computer Society,2005,33(2):2-13.DOI:10.1109/isca.2005.14.
|
[48] | BIDMESHKI M M,REDDY G R,ZHOU L,et al.Hardware-based Attacks to Compromise the Cryptographic Security of an Election System[C/OL].[2017-03-02].https://www.researchgate.net/publication/310807919_Hardware-based_attacks_to_compromise_the_cryptog raphic_secur it y_of_an_election_system.DOI:10.1109/iccd.2016.7753274.
|
[49] | ABRAMOVICI M,BRADLEY P.Integrated circuit security:New threats and solutions[C]//Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research:Cyber Security and Information Intelligence Challenges and Strategies.New York:ACM,2009:55.DOI:10.1145/1558607.1558671.
|
[50] | LIAO K,CUI X,LIAO N,et al.High-performance noninvasive side-channel attack resistant ECC coprocessor for GF(2m)[J].IEEE Transactions on Industrial Electronics,2017,64(1):727-738.DOI:10.1109/tie.2016.2610402.
|
[51] | BALDIN D,KERSTAN T.Proteus,a hybrid virtualization platform for embedded systems[C]//Analysis,Architectures and Modelling o f Embedded Systems.Berlin:Springer,2009:185-194.
|
[52] | ROUF I,MUSTAFA H,XU M,et al.Neighborhood Watch:Security and Privacy Analysis of Automatic Meter Reading Systems[C/OL].[2017-06-05].http://www.winlab.rutgers.edu/~gruteser/papers/f p-023-roufPS.pdf.DOI:10.1145/2382196.2382246.
|
[53] | EGHAM.Gartner Says Smartphone Sales Surpassed One Billion Units in 2014[EB/OL].[2015-03-03]http://www.gartner.com/newsroom/id/2996817.
|
[54] | GRACE M,ZHOU Y,ZHANG Q,et al.Riskranker:Scalable and accurate zero-day android malware detection[C]//Proceedings of the 10th International Conference on Mobile Systems,Applications,and Services.New York:ACM,2012:281-294.DOI:10.1145/2307636.2307663.
|
[55] | 赵波,张焕国,李晶,等.可信PDA计算平台系统结构与安全机制[J].计算机学报,2010,33(1):82-92.ZHAO B,ZHANG H G,LI J,et al.The system architecture and security structure of trusted PDA[J].Chinese Journal of Computers,2010,33(1):82-92(Ch).
|
[56] | BAI G,HAO J,WU J,et al.Trustfound:Towards a formal foundation for model checking trusted computing platforms[C]//International Symposium on Formal Methods.Cham:Springer,2014:110-126.DOI:10.1007/978-3-319-06410-9_8.
|
[57] | MANUEL P.A trust model of cloud computing based on quality of service[J].Annals of Operations Research,2015,233(1):281-292.
|
[58] | CHEN P,DESMET L,HUYGENS C.A study on advanced persistent threats[C]//IFIP International Conference on Communications and Multimedia Security.Heidelberg:Springer,2014:63-72.DOI:10.1007/978-3-662-44885-4_5.
|
[59] | EDGAR C.Ghost Push Malware Can Root Devices and Install Unwanted Apps[EB/OL].[2015-10-13].https://www.android authority.com/ghost-push-malwareroot-apps-fix-648735/.
|
[60] | KOVACS E.BlackEnergy Malware Used in Ukraine Power Grid Attacks[EB/OL].[2017-05-17].http://www.security week.com/blackenergy-group-uses-destructive-plugin-ukraine-attacks.
|
[61] | BATTISTELLO A,CORON J S,PROUFF E,et al.Horizontal side-channel attacks and countermeasures on the ISW masking scheme[C]//International Conference on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2016:23-39.DOI:10.1007/978-3-662-53140-2_2.
|
[62] | BAEK S S,WON Y S,HAN D G,et al.The effect of eight-shuffling AES implementations techniques against side channel analysis[J].Indian Journal of Science and Technology,2015,8:91.DOI:10.17485/ijst/2015/v8is5/61626.
|
[63] | SIM B Y,WON Y S,HAN D G.Study for improving attack complexity against RSA collision analysis[J].Journal o f the Korea Institute o f Information Security and Cryptology,2015,25(2):261-270.DOI:10.13089/jkiisc.2015.25.2.261.
|
[64] | YAN Q,LI Y,LI T,et al.Insights into malware detection and prevention on mobile phones[C]//International Conference on Security Technology.Berlin:Springer,2009:242-249.DOI:10.1007/978-3-642-10847-1_30.
|
[65] | HEUSER S,NADKARNI A,ENCK W,et al.ASM:A Programmable Interface for Extending Android Security[R/OL].[2017-05-12].https://www.trust.cased.de/fileadmin/user_upload/Group_TRUST/PubsPDF/asm_tr.pdf.
|
[66] | ENCK W,GILBERT P,HAN S,et al.TaintDroid:An information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems(TOCS),2014,32(2):5.DOI:10.1145/2494522.
|
[67] | LIU F,YAROM Y,GE Q,et al.Last-Level Cache Side-Channel Attacks Are Practical[C/OL].http://www.ieee-security.org/TC/SP2015/pa pers-archived/6949a605.pdf.DOI:10.1109/sp.2015.43.
|
[68] | 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学E辑:信息科学,2007,37(2):129-150.SHEN C X,ZHANG H G,FENG DG,et al.Survey on information security[J].Science in China Ser E:Information Science,2007,37(2):129-150(Ch).
|
[69] | KOUSHANFAR F,MIRHOSEINI A.A unified framework for multimodal submodular integrated circuits trojan detection[J].IEEE Transactions on In formation Forensics and Security,2011,6(1):162-174.DOI:10.1109/tifs.2010.2096811.
|
[70] | KARRI R,RAJENDRAN J,ROSENFELD K,et al.Trustworthy hardware:Identifying and classifying hardware trojans[J].Computer,2010,43(10):39-46.DOI:10.1109/mc.2010.299.
|
[71] | TEHRANIPOOR M,KOUSHANFAR F.A survey of hardware Trojan taxonomy and detection[J].IEEE Design&Test of Computers,2010,27(1):1.DOI:10.1109/mdt.2010.7.
|
[72] | BANERJEE N,XIE Y,RAHMAN M M,et al.From chips to dust:The MEMS shatter secure chip[C]//Micro Electro Mechanical Systems(MEMS),2014IEEE 27 th International Conference on.Washington D C:IEEE,2014:1123-1126.DOI:10.1109/memsys.2014.6765843.
|
[73] | CVE.CVE-2016-4657[EB/OL].[2016-08-25].https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657.
|
[74] | BUGIEL S,DAVI L,DMITRIENKO A,et al.Practical and lightweight domain isolation on Android[C]//Proceedings o f the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.Chicago:ACM,2011:51-62.DOI:10.1145/2046614.2046624.
|
[75] | RAD R,PLUSQUELLIC J,TEHRANIPOOR M.Sensitivity Analysis to Hardware Trojans Using Power Supply Transient Signals[C/OL].[2017-05-04].//https://www.researchgate.net/publication/4349859_Sensitivity_analysis_to_hardware_Trojans_using_power_supply_transient_signals.DOI:10.1109/hst.2008.4559037.
|
[76] | HICKS M,FINNICUM M,KING S T,et al.Overcoming an untrusted computing base:Detecting and removing malicious hardware automatically[C]//IEEE Symposium on Security&Privacy,2010,41(3):159-172.DOI:10.1109/sp.2010.18.
|
[77] | JIN Y,KUPP N,MAKRIS Y.DFTT:Design for Trojan Test[C/OL].[2017-05-06].http://www.eecs.uc f.edu/~jinyier/papers/ICECS10.pdf.DOI:10.1109/icecs.2010.5724725.
|
[78] | JIN Y,MAKRIS Y.Is Single Trojan Detection Scheme Enough[C/OL].[2017-06-07].http://isis.poly.edu/esc/2010/Reports/Yale%20University%20-%20Tier%20Jin.pdf.DOI:10.1109/iccd.2011.6081415.
|
[79] | CHEN J,WANG Q,GUO Z,et al.A circuit design of SMS4 against chosen plaintext attack[C]//201511th International Conference on Computational Intelligence and Security(CIS).Washington D C:IEEE,2015:371-374.DOI:10.1109/cis.2015.96.
|
[80] | HE Z,AO T,WAN M,et al.ERIST:An Efficient Randomized Instruction Insertion Technique to Counter Side-Channel Attacks[J/OL].[2017-06-02].https://www.researchgate.net/publication/301588137_ERIST_An_Efficient_Randomized_Instruction_Insertion_Technique_to_Counter_Side-Channel_Attacks.
|
[81] | WANG H,LAI T T T,ROY CHOUDHURY R.Mole:Motion Leaks Through Smartwatch Sensors[C/OL].[2017-05-11].http://www.cse.psu.edu/~gxc27/teach/597/smartwatch-mobicom 15.pdf.DOI:10.1145/2789168.2790121.
|
[82] | WIKIPEDIA.Operating system-Worldwide Devices Shipments[EB/OL].[2017-05-01].http://www.wikifigures.com/operating-system-worldwide-devicesshipments-detailed-graph-chart-data-en-1-138.
|
[83] | WANG X Q,SUN K,WANG Y W,et al.DeepDroid:Dynamically Enforcing Enterprise Policy on Android Devices[DB/OL].[2017-06-12].http://csis.gmu.edu/ksun/publications/DeepDroid-ndss2015.pdf.DOI:10.14722/ndss.2015.23263.
|
[84] | MITCHELL M,TIAN G,WANG Z.Systematic audit of third-party android phones[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy.New York:ACM,2014:175-186.DOI:10.1145/2557547.2557557.
|