Method for detecting hardware Trojan based on active optical watermark

A hardware Trojan detection, active optics technology, applied in electronic circuit testing and other directions, can solve the problems of small scale, small change range, difficult to determine, etc., to reduce the test complexity and reduce the effect of noise.

Active Publication Date: 2015-05-13
58TH RES INST OF CETC
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The biggest advantage of hardware Trojan detection based on side channel analysis on circuits is that the hardware Trojan can be detected without being triggered. The size of the implanted hardware Trojan is very small, and some side channel information, such as current and path delay, have very small changes
Considering the noise introduced in the measurement process and the noise caused by process drift in the chip manufacturing process, this extremely small side channel signal change will not be actually measured or even if it is measured, it is difficult to determine that it is caused by a hardware Trojan , or due to measurement noise, process drift noise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting hardware Trojan based on active optical watermark
  • Method for detecting hardware Trojan based on active optical watermark
  • Method for detecting hardware Trojan based on active optical watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0041] Hardware Trojan horses are formed by artificially adding, deleting or modifying the original circuit structure inside the chip during uncontrollable links such as circuit design and manufacturing.

[0042] Traditional detection methods, such as removing the circuit package and taking pictures layer by layer, and comparing it with the original circuit layout; or logic testing and bypass analysis are methods to detect the hardware Trojan itself.

[0043] The main method of the patent of the present invention is not to directly find the hardware Trojan itself, but to indirectly judge whether the inside of the circuit has been modified by checking whether the positions of some signs inside the circuit have changed compared with the original layout.

[0044] When the original circuit is modified, such as adding some logic, the layout of the circuit needs to b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting hardware Trojan based on an active optical watermark. The method comprises the steps of inserting some special units which do not influence the circuit function and have the temperature superior to that of the surrounding adjacent units after being electrified into a circuit and distributing to the layout according to a certain rule, wherein such special units are the active optical watermarks of the circuit; simulating to obtain the heat distribution map of the whole circuit while electrifying; performing the same test to the circuit and photographing after the circuit is manufactured and before packaging; comparing the simulated watermarks with the actual watermarks; if the watermark position changes or disappears, determining that the hardware Trojan is in the circuit. With the adoption of the method, the circuit is avoided various complex tests; the influence of the process noise and measurement noise in the traditional method can be overcome; the detection complexity can be obviously reduced; the detection accuracy can be improved.

Description

technical field [0001] The invention relates to a hardware Trojan detection method based on active optical watermarking, especially a method that does not require complex testing of the circuit and can overcome the influence of process noise and measurement noise on the circuit, and is especially suitable for low-complexity hardware Trojan detection. Detection method. Background technique [0002] In the process of designing and manufacturing integrated circuits, third-party design services, IP (intellectual property core), EDA (electronic design automation) software, and uncontrolled fabs and packaging and testing plants are often involved. , the chip is likely to be artificially modified, such as maliciously adding, deleting or changing the original circuit structure inside the chip. This kind of malicious circuit modification that will affect the function, performance, reliability, and security of the circuit is called It is a hardware Trojan horse. Since manufacturing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
Inventor 周昱魏敬和于宗光韩兆芳汤赛楠
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products