Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware trojan identification method based on single classification supporting vector machine

A technology of support vector machine and hardware Trojan, which is applied in the field of detection and recognition of hardware Trojan chips, can solve the problems of large errors and low efficiency, and achieve the effect of improving recognition efficiency and accuracy

Active Publication Date: 2013-06-12
HARBIN INST OF TECH AT WEIHAI
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the existing technology of using chip side channel information to identify the hardware Trojan horse in the chip, which needs to use manual observation images, which has the problems of large error and low efficiency, and provides a hardware Trojan horse based on single classification support vector machine recognition methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware trojan identification method based on single classification supporting vector machine
  • Hardware trojan identification method based on single classification supporting vector machine
  • Hardware trojan identification method based on single classification supporting vector machine

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0016] Specific implementation mode one: the following combination figure 1 Describe this embodiment, the hardware Trojan horse recognition method based on single classification support vector machine described in this embodiment, this method comprises the following steps:

[0017] Step 1. For all the chips to be tested, perform data preprocessing on the side channel information to obtain the preprocessed side channel information matrix of all the chips to be tested;

[0018] Step 2, select a part of the chip to be detected as the anti-section chip, and other remaining chips to be tested are called test chips, and the anti-section chip is reversely analyzed to determine whether each anti-section chip contains a hardware Trojan horse;

[0019] Step 3. For the anti-dissection chip that does not contain a hardware Trojan horse, divide it into two parts, one of which is used as a training sample chip, and the other part is used as a training optimization sample chip;

[0020] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A hardware trojan identification method based on a single classification supporting vector machine belongs to the detection and identification field of hardware trojan chips. The invention solves the problems of huge error and low efficiency in the prior art because the technology of utilizing chip side channel information to identify the chip hardware trojan requires to observe an image manually. The method provided by the invention comprises the following steps: I, preprocessing, and acquiring a side channel information matrix; II, selecting a backward analysis chip to perform backward analysis, and determining whether a hardware trojan is contained; III, dividing the backward analysis chip not containing the hardware trojan into a train sample and a train optimizing sample; IV, utilizing the side channel information matrix of the train sample to establish the characteristic space of the chip; V, acquiring the side channel characteristic data matrix of a chip to be detected; VI, performing normalization processing; VII, picking up the normalized data of the train sample and the train optimizing sample; VIII, training the single classification supporting vector machine to constitute a minimum hypersphere; and IX, if beyond the minimum hypersphere, then determining that the chip to be detected is a hardware trojan chip.

Description

technical field [0001] The invention relates to a hardware Trojan horse recognition method based on a single classification support vector machine, and belongs to the field of hardware Trojan horse chip detection and recognition. Background technique [0002] With the separation of various links such as integrated circuit design, manufacturing, testing, and packaging, it is more likely that the chips used by users will be implanted into hardware Trojan horse circuits by people with ulterior motives, which has brought great challenges to the field of information security and chip reliability. serious threat. At present, for the detection and identification of hardware Trojans, most of them adopt the technology of obtaining chip side channel information, extracting chip side channel information characteristic values, and establishing chip side channel information fingerprint library technology. The general steps of this technology are: first, randomly select some chips from a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
Inventor 王晨旭韩良喻明艳王进祥
Owner HARBIN INST OF TECH AT WEIHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products