Circuit safety design method for defending against threat of hardware Trojan horse based on triple modular redundancy

A three-mode redundancy, hardware Trojan technology, applied in computing, electrical digital data processing, protection of internal/peripheral computer components, etc., can solve the problems of difficult detection of logic values, difficult to find trigger conditions, etc.

Active Publication Date: 2015-06-17
58TH RES INST OF CETC
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, changing the logic value of the circuit is the most difficult to detect, because it is difficult to find its trigger condition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circuit safety design method for defending against threat of hardware Trojan horse based on triple modular redundancy
  • Circuit safety design method for defending against threat of hardware Trojan horse based on triple modular redundancy
  • Circuit safety design method for defending against threat of hardware Trojan horse based on triple modular redundancy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] With the integration level of integrated circuits getting higher and higher and the scale getting bigger and bigger, it becomes extremely difficult to complete the design of 100% test coverage for the circuit within the specified time.

[0036] Whether it is functional test coverage or structural test (DFT) coverage, it is difficult to achieve 100%.

[0037] This means that after the circuit is manufactured, some circuit nodes inside the circuit cannot be tested, that is, the specific conditions of this part of the circuit nodes during the circuit working process cannot be predicted and grasped.

[0038] When this part of the circuit node is used as the attack object of the hardware Trojan, it is impossible to carry out any test to determine whether there is a potential threat in the circuit node. Or even if a functional failure occurs, it is impossible to trace and debug what caused it.

[0039] After the integrated circuit is implanted with a hardware Trojan horse du...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a circuit safety design method which utilizes triple modular redundancy to guarantee that an original circuit can work stably even if a hardware Trojan horse is maliciously embedded in the original circuit. The circuit safety design method comprises the following steps: firstly, after finishing the design and verification of the original circuit, selecting logical nodes which can not be covered by all conventional testing methods, and taking the logical nodes as output nodes; secondly, backtracking the output nodes as terminal points in a fan-in direction, and determining input nodes according to certain rules; and finally, performing the triple modular redundancy design of paths between the input nodes and the output nodes respectively according to the difference between combinatorial logic and sequential logic. Through the circuit safety design method, final output cannot be affected even after the logic value of a circuit node, which cannot be tested or has high risk, is changed under the influence of a hardware Trojan horse, and the original function of the circuit is kept.

Description

technical field [0001] The invention relates to a circuit design method for defending against hardware Trojan threats based on triple-mode redundancy, in particular to a circuit security design method that can ensure correct circuit functions when the security of certain circuit nodes cannot be tested . Background technique [0002] With the development of the integrated circuit industry towards global cooperation, more and more third parties are involved in the integrated circuit industry chain, which makes more and more uncontrolled factors in the design and manufacturing process of integrated circuits. This raises concerns about the security of integrated circuits. Due to the participation of third-party uncontrolled links, integrated circuits are easily modified maliciously and implanted into hardware Trojan horses during the design and manufacturing process. Some of these hardware Trojans will change the function of the circuit, reduce the performance of the circuit, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50G06F21/71
Inventor 周昱桂江华张荣吴迪王淑芬汤赛楠
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products