Rare-vector-sequence-activated lossless detection method for hardware Trojans in integrated circuits

A vector sequence and integrated circuit technology, applied in the field of detection of malicious circuit modules, can solve problems such as detection and killing, and achieve the effect of avoiding threats and ensuring safety

Inactive Publication Date: 2012-08-15
NANKAI UNIV
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once a hardware Trojan is implanted into the system, it cannot be detected and killed like a software Trojan and a healthy system can be obtained. Instead, the Trojan can be removed from the system by redesigning and replacing hardware. At this time, the application system has already been damaged great influence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rare-vector-sequence-activated lossless detection method for hardware Trojans in integrated circuits
  • Rare-vector-sequence-activated lossless detection method for hardware Trojans in integrated circuits

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Because the activation of the hardware Trojan horse must be intentionally motivated, and this kind of incentive has nothing to do with the system designer, no matter it is wired or wirelessly connected, there must be a long distance, so the activation signal is usually loaded by serial communication.

[0021] In this embodiment, the integrated circuit to be tested is a serial data transmission integrated circuit implanted by the research group with a hardware Trojan horse. The transmission speed of the circuit receiving data is 115kbps, the data is CRC check data, each frame of data is 7 data bits + 4 check bits, the normal working current consumption is less than 20uA, and the bit error rate is less than 0.1%.

[0022] The specific test method is: use the phase-locked loop embedded in Xilinx's XC6VHX565T to achieve a high-precision test system clock. In this example, the integrated circuit chip is directly tested, and the integrated circuit is powered separately by a hi...

Embodiment 2

[0113] In this example, the integrated circuit to be tested is a serial data transmission integrated circuit implanted by the research group with another hardware Trojan horse. The transmission speed of the circuit receiving data is 115kbps, the normal data is CRC check data, each frame of data is 7 data bits + 4 check bits, the normal working current consumption is less than 20uA, and the bit error rate is less than 0.1%.

[0114] The specific test method is: use the phase-locked loop embedded in Xilinx's XC6VHX565T to realize a high-precision test system clock. In this example, the integrated circuit chip is directly tested, and the integrated circuit is powered by a high-precision power supply, and its current consumption and current consumption are monitored. Output port signal. And the rare vector sequence excitation generating circuit and the integrated circuit under test are powered separately.

[0115] In this example, the normal data received by the integrated circui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a rare-vector-sequence-activated lossless detection method for hardware Trojans in integrated circuits. The method comprises the following steps of: providing corresponding testing environments for integrated circuits to be tested; producing rare vector sequences for the integrated circuits to be tested; and exciting the integrated circuits to be tested by using the rare vector sequences, testing whether the characteristic parameters and functional roles of the integrated circuits to be tested are abnormal or not, and detecting the integrated circuits implanted with the hardware Trojans and recording breaking manners if the characteristic parameters and functional roles of the integrated circuits to be tested are abnormal. Based on the rare-vector-sequence-activated lossless detection method for the hardware Trojans in the integrated circuits, the integrated circuits implanted with the hardware Trojans can be detected before entering an application system, so that the application system is prevented from being threatened by the hardware Trojans, and the safety of key equipment in important systems is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit detection, and in particular relates to a method for detecting malicious circuit modules in integrated circuits. Background technique [0002] Integrated circuits are used in almost all modern equipment control systems. The important applications of integrated circuits involve all key equipment in important application fields such as national security, military, aerospace electronics, decision-making, communication, transportation, and finance. [0003] A hardware Trojan horse is a malicious circuit module implanted in a microelectronic system, which can monitor and attack opponents or potential opponents by changing the original system functions. It is inherently redundant to the system and has nothing to do with the normal function of the microelectronic system, or it should not exist at all, and its entire purpose of existence is malicious. Hardware Trojan horses are extremely hidd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/317
Inventor 任立儒刘会刚张福海耿卫东张德贤
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products