Hardware Trojan horse recognition method based on neural network

A hardware Trojan and neural network technology, applied in the field of neural network-based hardware Trojan recognition, can solve the problems of large errors and low efficiency, and achieve the effect of overcoming defects and improving recognition efficiency and accuracy

Inactive Publication Date: 2013-07-10
HARBIN INST OF TECH AT WEIHAI
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to solve the problem of large error and low efficiency in the existing method of using chip side channel information to identify whether a chip contains a hardware Trojan. Hardware Trojan Horse Recognition Method Based on Neural Network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse recognition method based on neural network
  • Hardware Trojan horse recognition method based on neural network
  • Hardware Trojan horse recognition method based on neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] A kind of hardware Trojan horse recognition method based on neural network described in this embodiment, the method comprises the following steps:

[0013] Step 1. For all the chips to be tested, perform data preprocessing on the side channel information to obtain a preprocessed side channel information matrix of all the chips to be tested;

[0014] Step 2, select a part of the chip to be detected as the anti-section chip, and other remaining chips to be detected are called test chips, and the reverse analysis is carried out to the anti-section chip to determine whether each anti-section chip contains a hardware Trojan horse;

[0015] Step 3, take out the side channel information corresponding to the anti-profile chip that does not contain the hardware Trojan horse determined by step 2 from the side channel information matrix described in step 1, and use this side channel information to establish the feature space of the chip;

[0016] Step 4, projecting the preprocesse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware Trojan horse recognition method based on a neural network. The problem that an existing recognition method does not need manual observation and is low in efficiency is solved, and recognition intelligentization of a hardware Trojan horse chip is achieved. The method comprises the following steps of first obtaining side channel information of a chip to be detected and performing data pre-processing; selecting a part of the chip to be detected to perform back subdivision analysis and confirming whether a back subdivision chip contains hardware Trojan horse or not; utilizing the back subdivision chip which does not contain the hardware Trojan horse to build a chip characteristic space through pro-processed side channel information; projecting all of chips to be detected into the characteristic space through a pro-processed side channel information matrix to obtain a side channel information characteristic data matrix; utilizing side channel information characteristic data of the back subdivision chip and a corresponding target output value to build and train the neural network; delivering the side channel information characteristic data of a tested chip to the trained neural network to be distinguished and output and achieving hardware Trojan horse recognition.

Description

technical field [0001] The invention relates to the detection and identification field of a hardware Trojan chip, in particular to a neural network-based hardware Trojan identification method. Background technique [0002] With the separation of various links such as integrated circuit design, manufacturing, testing, and packaging, it is more likely that the chips used by users will be implanted into hardware Trojan horse circuits by people with ulterior motives, which has brought great challenges to the field of information security and chip reliability. serious threat. At present, for the detection and identification of hardware Trojan chips, in most cases, the technology of extracting the characteristic value of the chip side channel information is used to establish the chip's side channel information fingerprint database. The general steps of this technology are: first, randomly select some chips from a batch of chips as samples; detect the side channel information of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06N3/02
Inventor 王晨旭罗敏喻明艳王进祥李杰
Owner HARBIN INST OF TECH AT WEIHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products