Hardware Trojan horse detection method and hardware Trojan horse detection system

A technology of hardware Trojan detection and hardware Trojan, applied in the direction of platform integrity maintenance, etc., can solve the problem of low resolution of hardware Trojan detection, achieve the effect of improving detection resolution and detection efficiency, simple algorithm, and short detection time

Active Publication Date: 2014-01-01
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although the above-mentioned hardware Trojan horse detection method has utilized the IC of the integrated circuit DDT and F max There is a linear relationship between them, but it only uses this linear dependence to conduct a simple trend analysis, that is, draw them on a graph as Y-axis and X-axis respectively, and observe whether the data of the integrated circuit under test is offset A baseline trend line is established to determine whether there is a hardware Trojan in the integrated circuit
Although the simple trend analysis of multiple bypass signals by this method can effectively detect some hardware Trojans, it fails to fully mine the correlation between multiple bypass signals, which leads to the identification of hardware Trojans. low rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method and hardware Trojan horse detection system
  • Hardware Trojan horse detection method and hardware Trojan horse detection system
  • Hardware Trojan horse detection method and hardware Trojan horse detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0022] see figure 1 Shown, a kind of hardware Trojan detection method comprises the following steps:

[0023] Step S101, collect the bypass signal of the integrated circuit under test, and then go to step S102.

[0024] As a better embodiment, the bypass signal collected in the embodiment of the present invention may include the following: heat signal, electromagnetic radiation signal, power consumption signal, time delay signal, quiescent current signal, transient power supply current signal, etc., the following Common instruments suitable for these bypass signal measurements are listed in Table 1.

[0025] Table 1 Bypass signals of integrated circuits and their measuring instruments

[0026]

[0027]

[0028] Step S102, extracting features of the bypass signal to form a feature set, and then proceed to step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware Trojan horse detection method and a hardware Trojan horse detection system. The method includes the following steps: collecting a by-pass signal of a to-be-detected integrated circuit; extracting features of the by-pass signal to form a feature collection; calculating mahalanobis distance values, including a mahalanobis value of a reference integrated circuit and a mahalanobis value of the to-be-detected integrated circuit, of the feature collection; comparing the mahalanobis value of the reference integrated circuit with that of the to-be-detected integrated circuit, and performing hardware Trojan horse detection according to a comparison result. By the hardware Trojan horse detection method and the hardware Trojan horse detection system which have the advantages of simple algorithm and short detection time, distinguishability and efficiency of hardware Trojan horse detection in integrated circuit testing are effectively improved, and any cost for hardware is not generated.

Description

technical field [0001] The invention relates to the field of integrated circuit testing, in particular to a hardware Trojan horse detection method and a hardware Trojan horse detection system. Background technique [0002] With the continuous improvement of integrated circuit manufacturing technology, the cost of establishing and maintaining an integrated circuit manufacturing plant at the forefront of technology is getting higher and higher (today, it takes nearly 30 billions of dollars), which resulted in the separation of the design process and the manufacturing process of the integrated circuit, that is, after the designer of the integrated circuit completes the circuit design, it delivers the final design data to the integrated circuit manufacturing plant, and the manufacturing plant is responsible for the specific processing and production. The above-mentioned status quo has caused the manufacturing process of integrated circuits to be out of the control of the design...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50
CPCG06F21/50
Inventor 王力纬
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products