Method and system for processing signals of hardware Trojan detection in integrated circuit

A hardware Trojan detection, integrated circuit technology, applied in the direction of electronic circuit testing, etc., can solve the problem of not being able to detect hardware Trojans, etc., to achieve the effect of improving accuracy, improving security, and improving detection resolution

Active Publication Date: 2014-04-02
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that existing integrated circuit testing technology cannot detect hardware Trojans, the present invention proposes a signal processing method and system for detecting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing signals of hardware Trojan detection in integrated circuit
  • Method and system for processing signals of hardware Trojan detection in integrated circuit
  • Method and system for processing signals of hardware Trojan detection in integrated circuit

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0067] Although the present invention has been described above in conjunction with the flow chart, the present invention is not limited to the above-mentioned specific embodiments, for example:

[0068] The signal preprocessing mentioned in the step S101 of the present invention, in addition to the above-mentioned "window truncation" and "filtering", can also include signal preprocessing methods such as "wavelet analysis" and "wavelet envelope analysis". The purpose of the present invention can still be achieved after the processing method replaces the "windowing and truncation" and "filtering" described above.

[0069] The hardware Trojan risk index generated in step S103 of the present invention, in addition to the above method based on the L2 distance calculation method between two different probability Gaussian distributions to generate the hardware Trojan risk index, can also use "based on self-organizing map (SOM) In the minimum quantization error (MQE)", "based on neura...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for processing signals of hardware Trojan detection in an integrated circuit. The method comprises the following steps of obtaining at least two bypass signals of the to-be-detected integrated circuit; respectively extracting a time domain feature and a frequency domain feature from each bypass signal, and enabling the time domain feature and the frequency domain feature of each bypass signal corresponding to the to-be-detected integrated circuit to form an n-dimension feature vector; converting the n-dimension feature vector into a hardware Trojan risk index by a preset conversion method, wherein the hardware Trojan risk index is used for featuring the degree of the risk of the hardware Trojan in the integrated circuit; comparing the hardware Trojan risk index of the to-be-detected integrated circuit with the preset risk index threshold value, and judging if the hardware Trojan exists in the to-be-detected integrated circuit according to the comparison result. The method and the system have the advantage that the hardware Trojan of the integrated circuit can be detected according to the bypass signals of a plurality of integrated circuits, so the safety of the integrated circuit is improved.

Description

technical field [0001] The invention relates to the technical field of integrated circuit detection, in particular to a signal processing method for hardware Trojan horse detection in integrated circuits and a signal processing system for hardware Trojan horse detection in integrated circuits. Background technique [0002] Due to the globalization of the semiconductor industry, the design process and manufacturing process of integrated circuits have been separated. This business model has greatly weakened the control of IC (integrated circuit, integrated circuit) designers over the manufacturing process, making integrated circuits Increasingly vulnerable to adversary sabotage and malicious modification during the manufacturing phase. Adversaries can add some additional malicious circuits (also known as "hardware Trojan horses") to the chip during the IC manufacturing process. Once these hardware Trojan horses are triggered, they can destroy or destroy the system, leak confid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/28
Inventor 王力纬
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products