Hardware Trojan horse detection system based on puf

A technology for hardware Trojan detection and design files, which is applied in the fields of instruments, calculations, electrical digital data processing, etc., and can solve problems such as high requirements, great difficulty, and insufficient cost

Inactive Publication Date: 2012-11-28
WUHAN UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention mainly solves the technical problem that the detection efficiency is not high enough and the cost is not low enough in the prior art, and the detection of a hardware Trojan needs to be compared with an IC without

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection system based on puf
  • Hardware Trojan horse detection system based on puf

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] Such as figure 1 As shown, the method includes:

[0034] Step 1, the user inputs the original IC design file into the original data saving module and saves it;

[0035] Step 2, the user chooses to add puf to several modules of the IC in the original IC design file through the puf adding module;

[0036] Step 3, the user sends the IC design file with puf added to the manufacturer for production, and in the test mode, the IC sample produced by the manufacturer according to the IC design file with puf added by the user is collected through the data acquisition module, and the collected The data is stored in the database; the collected data is: the feature vector generated by the PUF detection module.

[0037] Step 4, the collected data stored in the database is analyzed by the data analysis module, and a judgment result is output;

[0038] Step 5, the user judges the original data according to the data judging module to determine whether the original IC design in the or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware Trojan horse detection system based on puf. The system adds the puf into a plurality of modules of an integrated chip (IC) in an original IC design file, sends the IC design file with the puf to a factory for production, performs data acquisition on an IC sample produced by the factory according to the IC design file with the puf under a test mode, analyzes the acquired data through a data analysis module and outputs a judgment result; and a user judges whether the original IC design in an original data storage module is modified according to original data judged by a data judgment module and judges whether to put the original data into production. The hardware Trojan horse detection system has the advantages that the shortcomings that the conventional detection method is complicated, high in test cost and long in time period, and the original design or the original IC is needed are overcome; whether hardware Trojan horses are contained can be stably and effectively detected; naturally, the fact that the Trojan horses are very difficult to trigger is not considered; the Trojan horses are detected physically; and therefore, most hardware Trojan horses can be detected.

Description

technical field [0001] The invention relates to the technical field of hardware security, in particular to a puf-based hardware Trojan horse detection system. Background technique [0002] IC products are widely used in various industries. Various IC development kits not only bring convenience to designers, but also bury hidden dangers for designing circuits. The IC industry chain is not completely trustworthy. At any link before production, the original design may be added with malicious functions in the unused chip space, or the original design may be maliciously modified, that is, a hardware Trojan horse may be implanted. Once such a circuit is mass-produced and put into use, it may bring huge losses to the national society. Therefore, how to effectively detect whether there is a hardware Trojan has become an extremely urgent problem. [0003] The existing hardware Trojan detection methods can be roughly divided into four categories: [0004] 1. Physical inspection: t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
Inventor 唐明杨建康孙伟晋马啸陈彦昊
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products