Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware Trojan-resisting circuit design method based on blurring processing

A hardware Trojan horse, fuzzy processing technology, applied in the direction of electrical digital data processing, special data processing application, calculation, etc., to achieve the effect of increasing difficulty and effective detection

Active Publication Date: 2012-09-12
PEKING UNIV
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantage of this method is: the D flip-flop is controlled by the decoder, so the attacker can exhaust the input of the decoder, and then infer the complete state set of the circuit, so as to implement a more effective attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan-resisting circuit design method based on blurring processing
  • Hardware Trojan-resisting circuit design method based on blurring processing
  • Hardware Trojan-resisting circuit design method based on blurring processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The obfuscation-based anti-hardware Trojan horse circuit design method provided by the present invention will be described in detail below in conjunction with the accompanying drawings, but this does not constitute a limitation to the present invention.

[0020] The present invention is based on the anti-hardware Trojan horse circuit design method of fuzzy processing, and its steps comprise:

[0021] Part 1: Designing a Finite State Machine FSM

[0022] Step 1: Write finite state machine Verilog behavior level code;

[0023] Step 2: Carry out simulation with Modelsim SE to verify the function of the state machine. The state machine here should try to hide the state of the working mode, and the designer designs the activation key in this step;

[0024] Step 3: Use Design Complier to synthesize the behavior-level code, and the output of the state machine is the control signal of the D flip-flop MUX;

[0025] Part II: Grouping D Flip-Flops

[0026] Step 4: Use Microsof...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan (Hardware Trojan)-resisting circuit design method based on blurring processing. The method primarily comprises two parts: the first part is a finite-state machine (FSM); the second part is an original circuit with a modified D trigger structure, wherein the Q end and the non-Q end of the D trigger are connected to a multiplexer MUX; and signals of the control end of the MUX come from the FSM. According to the hardware Trojan-resisting circuit design method provided by the invention, the finite-state machine is added in a circuit; on the one hand, the states which circuits can reach are increased, on the other hand, attackers have no way to obtain information of the normal work modes of the circuits and only can add Trojans based on a blurring mode; however, the Trojans can be detected in the circuit test process. In comparison with the prior art, the protective degree for the normal work modes of the circuits is enhanced; the malicious party has difficulty to add effect Trojans; and the added Trojans can be detected more easily.

Description

technical field [0001] The invention relates to an anti-hardware Trojan horse circuit design method, in particular to a hardware Trojan horse circuit design method based on fuzzy processing. Background technique [0002] With the continuous acceleration of the globalization process of integrated circuit production, more and more integrated circuit manufacturers choose to conduct circuit production through outsourcing. The advantage of outsourcing production is that it greatly saves costs and shortens the time from design and production to market launch. However, the outsourced production method separates circuit design from manufacture, that is, a malicious third party may have the opportunity to modify the design during the entire circuit production process. This will have a crucial impact on the authenticity (authentication) and credibility (trust) of the circuit. Malicious parties (adversary) can modify the structure of the circuit during the production process, that is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50G06F21/00G06F21/56
Inventor 冯建华韩旭李蕾张兴
Owner PEKING UNIV