Hardware-Trojan-resisting circuit design method based on activation probability analysis

A probabilistic analysis and hardware Trojan horse technology, applied in the direction of measuring electricity, measuring electrical variables, instruments, etc., can solve the problems of strong concealment and harmfulness of Trojan horse circuits, and achieve enhanced resistance, enhanced protection, and low hardware overhead Effect

Active Publication Date: 2014-10-15
PEKING UNIV
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The technical problem to be solved by the present invention is to provide a circuit design method capable of resisting hardware Trojan horse attacks in view of the characteristics of strong concealment and great harm of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware-Trojan-resisting circuit design method based on activation probability analysis
  • Hardware-Trojan-resisting circuit design method based on activation probability analysis
  • Hardware-Trojan-resisting circuit design method based on activation probability analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The anti-hardware Trojan horse circuit design method based on activation probability analysis proposed by the present invention will be described in detail in conjunction with the accompanying drawings and embodiments below.

[0031] The present invention provides a circuit module capable of changing the jump probability of circuit nodes—probabilistic fuzzy unit, which is divided into two structures of exclusive-or type and same-or type, such as figure 2 and image 3 .

[0032] In order to make the implanted hardware Trojan escape the conventional test, the malicious party will choose a node with a low activation probability in the circuit to implant the hardware Trojan. The probabilistic fuzzy unit was invented based on the design psychology of the malicious party, and its function is to interfere with the judgment of the activation probability of the circuit node by a third party who is not authorized to use the circuit. here to Figure 7 The circuit in is taken a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of testability design of an integrated-circuit technology and discloses a hardware-Trojan-resisting circuit design method based on activation probability analysis. The method mainly includes two parts: a first part: circuit design of a probability fuzziness unit and a second part: an insertion algorithm of the probability fuzziness unit. Targeting at characteristics of high elusiveness and high perniciousness of hardware Trojans, through analysis of a circuit node activation probability, the method selects an appropriate node to insert the probability fuzziness unit circuit so that an attacker is incapable of correctly judging a signal jumping probability of nodes in the circuit and inserts hardware Trojans only based on the circuit which undergoes probability fuzziness. Compared with the prior art, the hardware-Trojan-resisting circuit design method based on activation probability analysis is capable of strengthening the hardware Trojan resisting capability of a design circuit so that implanted hardware Trojans are incapable of achieving a specific objective designed by an attacker and are easily detectable in a test period.

Description

technical field [0001] The invention relates to the field of testability design of integrated circuits, in particular to an anti-hardware Trojan horse circuit design method based on activation probability analysis. Background technique [0002] In the era of information technology, software security issues have been highly valued, but the security threats of hardware, which is the foundation of software applications, are often underestimated. In 2005, in a report of the US National Defense Science Board, it was first proposed that due to the separation of the design and production process of integrated circuits, there will be credibility problems in the supply of integrated circuits [1]. The separation of integrated circuit design and production process means that integrated circuit design manufacturers adopt the method of foundry for circuit production [2]. With the trend of globalization of the integrated circuit industry in recent years, a circuit chip often needs to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/3185
Inventor 冯建华龚浩然
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products