Hardware Trojan horse detection method and hardware Trojan horse detection system based on test vectors

A hardware Trojan detection and test vector technology, applied in the field of electronics, can solve problems such as high destructiveness, high cost, and long detection time.

Active Publication Date: 2014-12-17
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a hardware Trojan detection method and system based on test vectors for t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method and hardware Trojan horse detection system based on test vectors
  • Hardware Trojan horse detection method and hardware Trojan horse detection system based on test vectors
  • Hardware Trojan horse detection method and hardware Trojan horse detection system based on test vectors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] see figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the test vector-based hardware Trojan detection method of the present invention.

[0024] The described test vector-based hardware Trojan detection method of the present embodiment comprises the following steps:

[0025] Step S101 , acquiring flip information and coverage information of each circuit node in the integrated circuit.

[0026] Step S102 , selecting circuit nodes whose flipping information and coverage information meet preset low flipping conditions and preset low coverage conditions respectively as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware Trojan horse detection method and a hardware Trojan horse detection system based on test vectors. The method includes receiving reversal information and coverage information of each circuit node in an integrated circuit; selecting circuit nodes as candidate Trojan horse nodes, wherein the reversal information and the coverage information of the circuit nodes meet preset low reversal conditions and preset low coverage conditions respectively; selecting final test vectors from the test vectors according to the reversal information of each candidate Trojan horse node and combined reversal information of each group of candidate Trojan horse nodes; respectively applying the final test vectors to the input end of the integrated circuit, and performing Trojan horse detection on the integrated circuit. By the method and the system, whether or not the integrated circuit contains hardware Trojan horses can be quickly and accurately detected without damage to the integrated circuit.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a hardware Trojan horse detection method and system based on test vectors. Background technique [0002] With the rapid development and wide application of integrated circuits (ICs, Integrated Circuits), the detection of hardware Trojan Horses (Hardware Trojan Horses) maliciously embedded in integrated circuits has become more and more important. Hardware Trojans are malicious circuits implanted into integrated circuits, which can implement destructive functions or leak secret information inside integrated circuits under specific trigger activation conditions, posing a great threat to the security of integrated circuits. [0003] The detection method of the hardware Trojan has physical detection. Physical inspection takes the chip through corrosion and peeling, and uses scanning electron microscope, electronic probe and other equipment to restore the chip to the layout, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/28
Inventor 侯波何春华王力纬恩云飞谢少锋
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products