Integrated circuit hardware Trojan horse detection method and system

A hardware Trojan detection and integrated circuit technology, applied in electronic circuit testing and other directions, can solve the problems of difficult to guarantee recognition accuracy and low efficiency, and achieve the effect of improving recognition ability and efficiency, improving resolution, and improving feature extraction ability.

Active Publication Date: 2014-12-17
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Based on this, it is necessary to provide a method and system for detecting an integrated circuit hardware Trojan horse for the above-mentioned problem that the recognition accuracy is difficult to guarantee and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated circuit hardware Trojan horse detection method and system
  • Integrated circuit hardware Trojan horse detection method and system
  • Integrated circuit hardware Trojan horse detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation of the integrated circuit hardware Trojan horse detection method and system of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] see figure 1 as shown, figure 1 It is a flowchart of an integrated circuit hardware Trojan horse detection method of an embodiment, including the following steps:

[0030] Step S10, acquiring bypass information training samples of a set number of Trojan horse chips and non-Trojan horse chips.

[0031] In one embodiment, a set number of bypass information training samples of Trojan horse chips and non-Trojan horse chips can be obtained through reverse engineering.

[0032] Step S20, performing principal component analysis on the bypass information training samples of the non-Trojan chip to obtain a k-dimensional principal feature vector of the non-Trojan chip.

[0033] In one embodiment, the k-dimensional principal eigenvector of the non-Trojan chip byp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an integrated circuit hardware Trojan horse detection method and system. The method includes acquiring bypass information training samples of Trojan horse chips and non Trojan horse chips in the set numbers; performing main component analysis on the bypass information training samples of the non Trojan horse chips to acquire k-dimensional principal eigenvectors; calculating the feature projection of a chip to be detected of bypass information vectors of the chip to be detected on the k-dimensional principal eigenvectors of the non Trojan horse chips and the Trojan horse chip feature projection and non Trojan horse chip feature projection of the bypass information training samples of the Trojan horse chips and non Trojan horse chips on the k-dimensional principal eigenvectors of the non Trojan horse chips respectively; if K< / =3, judging the chip to be detected to be a Trojan horse chip or non Trojan horse chip according to a k-dimensional image; if the k > 3, judging the chip to be detected to be a Trojan horse chip or non Trojan horse chip according to the mahalanobis distance. The method is adaptive to the characteristic of uncertainty of the data dimension, the Trojan horse chip and non Trojan horse chip can be identified accurately, and the integrated circuit pattern identifying capability and efficiency are improved.

Description

technical field [0001] The invention relates to the technical field of hardware safety detection, in particular to a method and system for detecting an integrated circuit hardware Trojan horse. Background technique [0002] With the development of semiconductor technology and manufacturing technology, hardware outsourcing design and tape-out have become a global trend. In recent years, a new type of hardware attack method against integrated circuit chips has emerged, called "hardware Trojan horse". Hardware Trojans mainly refer to artificially maliciously adding some illegal circuits or tampering with original design files in the process of IC design and manufacturing, thereby leaving "time bombs" or "electronic backdoors", etc., opening the door for subsequent attacks. Once a hardware Trojan is artificially and covertly inserted into a complex chip, it is generally very difficult to detect. [0003] With the emergence and development of hardware Trojan detection technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
Inventor 何春华侯波王力纬恩云飞谢少锋
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products