Hardware trojan detection method independent of datum curve

A technology of hardware Trojan detection and reference curve, which is applied in the direction of electronic circuit testing, etc., to achieve the effect of eliminating noise and accurate transient current data

Inactive Publication Date: 2015-05-20
58TH RES INST OF CETC
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the deficiencies in the prior art, to provide a hardware Trojan detection method that does not rely on the re

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware trojan detection method independent of datum curve
  • Hardware trojan detection method independent of datum curve
  • Hardware trojan detection method independent of datum curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0038]The traditional hardware Trojan detection technology based on bypass analysis has a premise, which is to first obtain a circuit without a hardware Trojan, and then obtain the bypass information data in its normal working state as a benchmark curve, and then perform the same test on the chip to be tested. The test, and obtain the bypass information data curve of the chip under test, and compare it with the reference curve.

[0039] When the bypass information value of the chip to be tested does not exceed the preset threshold compared with the reference curve, it is considered that there is no hardware Trojan inside the chip to be tested; when the bypass information value of the chip to be tested exceeds the preset threshold compared with the reference curve If the predetermined threshold is exceeded, it is considered that the chip under test contains a ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware trojan detection method independent of a datum curve. The hardware trojan detection method comprises the following steps: firstly, testing all original test vectors, and judging whether hardware Trojan exists in a chip according to the output result; secondly, modifying each original test vector, so that the same test input in each test vector repeatedly appears for a plurality of times; the test input appears at an interval of a certain period of time in each time, so that partial test codes in each modified test vector repeatedly appear in different time windows for a plurality of times; applying all modified test vectors to a circuit test, and recording corresponding circuit transient current curves of all modified test vectors in the testing process; finally finding out a curve section corresponding to the same test code from each modified test vector in different time windows, and comparing the curve sections. If the fitted circuit transient current curves corresponding to different time windows do not exceed a threshold value, and are not crossed, then the hardware trojan is not contained.

Description

technical field [0001] The invention relates to a hardware Trojan detection method that does not rely on a reference curve, especially a detection method that cannot be guaranteed to obtain a circuit that does not contain a hardware Trojan as a reference, and is especially suitable for detecting third-party imported chips . Background technique [0002] With the increasingly complex design of integrated circuits (IC, Integrated Circuit) and the increasing manufacturing costs, the design and manufacture of integrated circuits are moving towards the trend of global cooperation. Therefore, in the process of designing and manufacturing integrated circuits, more and more frequent It involves third-party IP (Intellectual Property Intellectual Property), Design Service (Design Service), EDA (Electronic Design Automation) tools and uncontrolled wafer manufacturing and packaging testing. In these links, chips are likely to be Man-made modifications, such as malicious addition, delet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/28
Inventor 周昱于宗光魏敬和吴迪汤赛楠
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products