Integrated circuit hardware Trojan detection method and system

A hardware Trojan detection and integrated circuit technology, applied in electronic circuit testing and other directions, can solve the problems of high cost and low efficiency of hardware Trojan detection, and achieve the effect of reducing cost and improving detection efficiency.

Active Publication Date: 2015-01-28
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, aiming at the problems of low efficiency and high cost of hardware Trojan horse detection in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated circuit hardware Trojan detection method and system
  • Integrated circuit hardware Trojan detection method and system
  • Integrated circuit hardware Trojan detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The specific implementation of the integrated circuit hardware Trojan horse detection method and system provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0025] refer to figure 1 , figure 1 Shown is a flowchart of an integrated circuit hardware Trojan horse detection method of an embodiment, as shown in the figure, the integrated circuit hardware Trojan horse detection method provided by this embodiment includes the following steps:

[0026] s100, obtaining bypass information data of the chip to be tested;

[0027] In the above step s100, the required bypass information can be selectively obtained according to the functions of the chip to be tested and the bypass information corresponding to the area where there may be a hardware Trojan horse, and the above bypass information can be stored in the vector X k , used for subsequent chip clustering and type determination, where X k The subscript k=1,2,......

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an integrated circuit hardware Trojan detection method and system. The integrated circuit hardware Trojan detection method comprises obtaining the bypass information data of chips to be detected; extracting a plurality of sample chips from the chips to be detected to be clustered into two chip clusters and determining corresponding cluster centers; extracting several sample chips from the two clusters for reverse engineering hardware Trojan analysis and determining the types of the several sample chips; determining the types of the other chips to be detected according to the Euclidean distance between the other chips to be detected and the two cluster centers, wherein the other chips are except the cluster chips. According to the integrated circuit hardware Trojan detection method and system, the hardware Trojan detection work of the chips to be detected can be achieved without a large amount of integrated circuit hardware Trojan reverse engineering analysis work and accordingly the integrated circuit hardware Trojan detection efficiency is improved and the cost in the detection process is reduced.

Description

technical field [0001] The invention relates to the technical field of integrated circuit detection, in particular to a method and system for detecting an integrated circuit hardware Trojan horse. Background technique [0002] With the development of semiconductor technology and manufacturing technology, hardware outsourcing design and tape-out has become a global trend. In recent years, a new type of hardware attack method against integrated circuits has emerged, called "hardware Trojan horse". Hardware Trojans mainly refer to artificially maliciously adding some illegal circuits or tampering with original design files in the process of IC design and manufacturing, thereby leaving "time bombs" or "electronic backdoors", etc., opening the door for subsequent attacks. Once a hardware Trojan is artificially and covertly inserted into a complex chip, it is very difficult to detect. Its harm mainly includes stealing important information of the chip, affecting circuit performanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/28
Inventor 何春华侯波王力纬恩云飞谢少锋
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products