Hardware Trojan-resisting circuit design method based on blurring processing
A hardware Trojan horse, fuzzy processing technology, applied in the direction of electrical digital data processing, special data processing application, calculation, etc., to achieve the effect of increasing difficulty and effective detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The obfuscation-based anti-hardware Trojan horse circuit design method provided by the present invention will be described in detail below in conjunction with the accompanying drawings, but this does not constitute a limitation to the present invention.
[0020] The present invention is based on the anti-hardware Trojan horse circuit design method of fuzzy processing, and its steps comprise:
[0021] Part 1: Designing a Finite State Machine FSM
[0022] Step 1: Write finite state machine Verilog behavior level code;
[0023] Step 2: Carry out simulation with Modelsim SE to verify the function of the state machine. The state machine here should try to hide the state of the working mode, and the designer designs the activation key in this step;
[0024] Step 3: Use Design Complier to synthesize the behavior-level code, and the output of the state machine is the control signal of the D flip-flop MUX;
[0025] Part II: Grouping D Flip-Flops
[0026] Step 4: Use Microsof...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 