Nondestructive detecting method of mixed activated hardware Trojan horse in integrated circuit

A technology of integrated circuits and hardware Trojan horses, applied in the field of detection of malicious circuit modules, can solve problems such as detection and killing, and achieve the effect of avoiding being attacked and ensuring safety

Inactive Publication Date: 2012-08-01
NANKAI UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once a hardware Trojan is implanted into the system, it cannot be detected and killed like a software Trojan and a healthy system can be obtained. Instead, the Trojan can be removed from the system by redesigning and replacing hardware. At this time, the application system has already been damaged great influence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Nondestructive detecting method of mixed activated hardware Trojan horse in integrated circuit
  • Nondestructive detecting method of mixed activated hardware Trojan horse in integrated circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] The integrated circuit tested in this example is the integrated circuit implanted by the research group into a hardware Trojan horse. This circuit features a MEMS acceleration sensor, serial data transmission and processing. The transmission speed of the circuit receiving data is 115kbps, the normal data is CRC check data, each frame of data is 7 data bits + 4 check bits, the normal working current consumption is less than 20uA, and the bit error rate is less than 0.1%.

[0023] The specific test method is: use the phase-locked loop embedded in Xilinx's XC6VHX565T to realize a high-precision test system clock. The circuit is powered independently and its current consumption and output port signal are monitored. The rare vector sequence generator is coded in verilog hardware description language, synthesized with Foundation ISE and downloaded to the XC6VHX565T structure for implementation, and is powered separately from the integrated circuit under test.

[0024] In th...

Embodiment 2

[0100] The circuit tested in this example is an integrated circuit implanted by the research group into a hardware Trojan. This circuit features a MEMS acceleration sensor, serial data transmission and processing. The transmission speed of the circuit receiving data is 115kbps, the normal data is CRC check data, each frame of data is 7 data bits + 4 check bits, the normal working current consumption is less than 20uA, and the bit error rate is less than 0.1%.

[0101] The specific test method is: use the phase-locked loop embedded in Xilinx's XC6VHX565T to realize a high-precision test system clock. The circuit is powered independently and its current consumption and output port signal are monitored. The rare vector sequence generator is coded in verilog hardware description language, synthesized with Foundation ISE and downloaded to the XC6VHX565T structure for implementation, and is powered separately from the integrated circuit under test.

[0102] In this example, the no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a nondestructive detecting method of an acceleration and rare vector sequence mixed activated hardware Trojan horse in an integrated circuit. The nondestructive detecting method comprises the following steps of: providing a corresponding testing environment to the integrated circuit; generating a rare vector sequence set for the integrated circuit; applying maximum acceleration, which is not less than the acceleration born during normal working, to the integrated circuit; exciting the integrated circuit by using the rare vector sequence; testing whether characteristic parameters and function effects of the integrated circuit are abnormal or not; and if so, detecting the integrated circuit implanted with the hardware Trojan horse and recording a destruction method. According to the invention, the integrated circuit implanted with the hardware Trojan horse can be detected before entering an application system so as to prevent the application system from being threatened by the hardware Trojan horse and ensure the safeties of important systems.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit detection, and in particular relates to a method for detecting malicious circuit modules in integrated circuits. Background technique [0002] Missiles, rockets and fighter jets are important military equipment related to national security in today's era. When they play a role, they will generate a large acceleration, and the maximum can be close to 50g. With the application of high-tech weapons, integrated circuits have become a key component of the control core of these equipment. [0003] A hardware Trojan horse is a malicious circuit module implanted in a microelectronic system, which can monitor and attack opponents or potential opponents by changing the original system functions. It is inherently redundant to the system and has nothing to do with the normal function of the microelectronic system, or it should not exist at all, and its entire purpose of existence is malicious. Ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
Inventor 任立儒刘会刚张福海耿卫东张德贤
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products