Characteristic value processing method for hardware Trojan detection

A hardware Trojan detection and processing method technology, applied in the direction of electrical digital data processing, instruments, calculations, etc., can solve the problem of cost increase, and achieve the effect of saving manpower and material resources

Inactive Publication Date: 2012-12-19
WUHAN UNIV
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method makes the cost need to be greatly improved, because it ta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Characteristic value processing method for hardware Trojan detection
  • Characteristic value processing method for hardware Trojan detection
  • Characteristic value processing method for hardware Trojan detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 Shown:

[0031] (1) 1. First of all, the left end starts with selection step 1, modeling for the detection data: for the collected data, use the modeling algorithm to build a model, use the self-organizing competition neural network algorithm for modeling, and use the weight adjustment The learning rule is the Kohonen learning rule, the threshold value adjustment selects the threshold value learning rule, and the competition layer network is two nodes; then clustering and classification are performed;

[0032] 2. Starting from the right end is the selection step 2. No modeling is performed on the detection data, that is, the existing data is directly judged: the data to be detected is clustered and classified, and the evaluation function is used for evaluation. Through the corresponding transformation, the obtained The possible coefficient of hardware Trojans, if the number is very low, it means that this set of data is normal, and the detection of thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a characteristic value processing method for hardware Trojan detection without a clean circuit board for comparison. A system is established for processing characteristic values acquired for hardware Trojan detection, and accordingly abnormal data are detected without the clean circuit board for comparison. Moreover, the method provides two selectable detection schemes which are a model-free detection scheme and a model detection scheme respectively, wherein the model-free detection scheme includes the steps of circularly calling various parameters (including distance functions and a classification method) by the aid of an unsupervised clustering method to obtain a clustering-based strategy highest in evaluation function, and then classifying, the model-free detection scheme is high in speed, and the precision already meet primary demand; and the model detection scheme uses a unsupervised neural network algorithm which is low in speed but high in precision, serves as an selection of the detection schemes but is not necessary, and is applicable to situations high in requirement on precision.

Description

technical field [0001] The invention relates to a method for processing characteristic values ​​of Trojan horse detection, in particular to a method for processing characteristic values ​​of hardware Trojan horse detection. Background technique [0002] Currently, there are four hardware Trojan detection methods: physical inspection, functional testing, built-in self-test and bypass analysis techniques. These four schemes, when detecting hardware Trojans, all need to use a golden board, that is, a clean circuit board as a contrast, so that circuits containing hardware Trojans can be detected. But this method makes the cost need to be greatly improved, because obtaining a clean circuit board requires a lot of manpower and material resources. Contents of the invention [0003] The present invention mainly solves the technical problems existing in the prior art; it provides a hardware Trojan detection eigenvalue processing method that can detect whether the circuit board is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
Inventor 唐明杨建康孙伟晋陈彦昊李伟杰
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products