Activity measurement-based hardware trojan detection method

A hardware Trojan detection and activity technology, applied in the field of hardware Trojan detection and hardware Trojan detection based on activity measurement, can solve the problems of strong destructiveness, no quantitative measurement method, hardware Trojan is not easy to be activated, etc., and achieves strong flexibility Effect

Active Publication Date: 2012-09-12
PEKING UNIV
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 3. Strong destructive
They pointed out that the input end of the hardware Trojan trigger part should come from a node with low activity in the t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Activity measurement-based hardware trojan detection method
  • Activity measurement-based hardware trojan detection method
  • Activity measurement-based hardware trojan detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0028] A kind of hardware Trojan detection method based on activity measurement of the present invention, its step comprises:

[0029] Phase 1: Data Preprocessing

[0030] 1. Check the input file format, if the circuit format conforms to the proposed .bench file format, such as image 3 , proceed to the next stage.

[0031] 2. Use perl language, according to image 3 The conversion principle shown converts the gate-level netlist structure of the target circuit into the .bench file format. This conversion simplifies the expression form of the circuit, and is beneficial to restore the topology of the circuit using a programming language.

[0032] For sequential circuits, due to the existence of sequential devices, when the circuit works normally, the node logic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed in the invention is an activity measurement-based hardware trojan detection method, comprising three parts: bench file generation, circuit activity measurement and hardware tojan detection test vector set generation. More specifically, a circuit netlist is analyzed; activity values of internal nodes of the circuit are calculated; lists of circuit nodes with low 0 activity and low 1 activity are generated; and determination and grouping are carried out on the nodes to generate a hardware trojan detection test vector set. According to the invention, different activity threshold values can be arranged; there is no extra hardware cost for hardware trojan detection; and combined logical type hardware trojan can be effectively detected. Besides, the provided method can be applied for target node extraction in a hardware trojan detectable design method.

Description

technical field [0001] The invention relates to a hardware Trojan detection method, in particular to a hardware Trojan detection method based on activity measurement, and belongs to the field of chip security detection. Background technique [0002] A hardware Trojan refers to a malicious hardware module that is added or inserted into a target circuit (also known as a golden chip) by an attacker during the design or manufacturing process of a chip. Under certain conditions, the hardware Trojan horse is triggered, which can achieve the purpose of interfering with, destroying the normal operation of the circuit or stealing the confidential information of the circuit. [0003] With the globalization of the semiconductor manufacturing industry, it is more and more likely that chips will be introduced into security risks. Out of the need to reduce costs, manufacturers have shifted from high-cost areas to low-cost areas, resulting in the lack of effective safety supervision in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/3183
Inventor 尚子靖冯建华李蕾安辉耀王新安张兴
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products