Design method of integrated circuit and hardware trojan detection method

A technology of integrated circuits and design methods, which is applied in computing, electrical digital data processing, special data processing applications, etc., and can solve problems such as inability to locate hardware Trojan horses

Active Publication Date: 2014-12-24
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF2 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, it is necessary to provide an integrated circuit design method and a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of integrated circuit and hardware trojan detection method
  • Design method of integrated circuit and hardware trojan detection method
  • Design method of integrated circuit and hardware trojan detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0024] Such as figure 1 As shown, it is a schematic flow diagram of an embodiment of the design method of the integrated circuit of the present invention, including steps:

[0025] Step S101: Obtain the register transfer level code of the initial integrated circuit design;

[0026] The register transfer level (RTL) code is obtained from the original integrated circuit design, which is generally described in VerilogHDL or VHDL language.

[0027] Step S102: Determine the node positions of potential hardware Trojan implants in the initial integrated circuit design according to the code;

[0028] In order to achieve a concealed effect, hardware Trojans often use nodes with very low activity inside the circuit as their trigger conditions, making it difficult to be activated and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a design method of an integrated circuit and a hardware trojan detection method. The design method comprises the following steps of acquiring a code of a register transfer level of an initial integrated circuit design; confirming a node position embedded by a potential hardware Trojan in the initial integrated circuit design according to the code; simulating the initial integrated circuit design to obtain a simulating circuit; computing the logic value probability of an interconnection line of the node position in the simulating circuit, and carrying out insertion design of testability circuits on the interconnection line of the node position according to the logic value probability; sequentially connecting the testability circuits in the simulating circuit to form a scan chain, and acquiring a new integrated circuit design according to the simulating circuit with the scan chain, wherein the scan chain is used for detecting the position of the hardware trojan of the integrated circuit according to the input test signals and the output results. According to the integrated circuit designed by the scheme of the invention, the position of the hardware trojan can be found, and the cost is reduced.

Description

technical field [0001] The invention relates to the technical field of integrated circuits, in particular to an integrated circuit design method and a hardware Trojan horse detection method. Background technique [0002] With the development of integrated circuit technology and the intelligence of information systems, integrated circuit information security has gradually become the focus of attention. The current design and manufacturing process of advanced integrated circuits involves many uncontrolled links, such as: using a large number of third-party IP cores, outsourcing the manufacturing process to professional chip foundries, and using EDA design software provided by third-party suppliers. These current situations have greatly weakened the control of IC designers over the design and manufacturing process, making integrated circuits more and more vulnerable to sabotage and malicious modification by opponents during the design or manufacturing stage. Some additional ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/50G06F21/56
Inventor 王力纬侯波何春华恩云飞谢少锋
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products