Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan detection method based on bypass analysis

A hardware Trojan detection and bypass analysis technology, applied in the field of computer algorithms, can solve the problems of integrated circuit security threats, disturbing the original function of the chip, leaking sensitive information of the chip, etc., so as to reduce the amount of calculation, reduce the implementation cost, and eliminate process noise. Effect

Inactive Publication Date: 2015-07-08
JIANGXI UNIV OF TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For integrated circuit (IC) chips used in safety-sensitive systems such as avionics, finance, and transportation, special attention needs to be paid to their reliability, safety and credibility . However, the globalization trend of the integrated circuit industry separates the design of IC chips from the manufacturing process, leading to risks in the outsourcing manufacturing process of IC chips: Some untrustworthy manufacturers may change the original design of IC chips and embed so-called hardware Trojan horses Circuits; these circuits can be activated under specific trigger conditions, thereby leaking sensitive information inside the chip or disrupting the original function of the chip, making the entire system invalid. Due to the huge potential harm of hardware Trojans and the difficulty of detection using traditional testing techniques, hardware Trojans are considered to be a major threat to the security of integrated circuits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A hardware Trojan horse detection method based on bypass analysis, comprising the steps of:

[0019] (1) The detection method is based on the following assumptions: N integrated circuit chips that have been confirmed to be free of hardware Trojans can be obtained, and for each integrated circuit chip without hardware Trojans (I 1 , I 2 ,..., I N ) to apply the test vector V T , make the chip perform computing operation C, measure and collect the instantaneous power consumption information of the chip L times, collect and obtain L×N power consumption curves of the chip without a hardware Trojan horse, for the integrated circuit chip I without a hardware Trojan horse k (k=1, 2,..., N) carry out the measurement of the instantaneous power consumption of a chip, the power consumption r obtained by the power consumption measurement process k (t; I k ;C;M) can be decomposed into r k (t; I k ;C;M)=P(t;C)+v(t;I k ;C)+n(t;M), t is time; P(t;C) is average power consumption,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan detection method based on bypass analysis. The hardware Trojan detection method has the advantages of being free of destructivity, small in implementing expenditure and the like, even in an environment with large measuring noise and technology noise, the detection method can be used for detecting the hardware Trojan with the area smaller than that of an original design circuit by two orders of magnitudes in chips, the signal processing technology which is more applicable than a singular value decomposition algorithm is discussed, the efficiency of detecting the hardware Trojan is improved, the influences of measuring noise can be eliminated by calculating the average value of L power consumption curves of each chip, the technology noise can be eliminated by calculating the average value of the average power consumption curve of N the hardware Trojan chips, P (t; C) is obtained, the calculated amount can be reduced, and time and labor are saved.

Description

[0001] technical field [0002] The invention belongs to the field of computer algorithms, more specifically, the invention relates to a hardware Trojan horse detection method based on bypass analysis. Background technique [0003] For integrated circuit (IC) chips used in security-sensitive systems such as avionics, finance, and transportation, special attention needs to be paid to their reliability, security, and credibility. However, the globalization trend of the integrated circuit industry separates the design of IC chips from the manufacturing process, leading to risks in the outsourcing manufacturing process of IC chips: Some untrustworthy manufacturers may change the original design of IC chips and embed so-called hardware Trojan horses Circuits; these circuits can be activated under specific trigger conditions, thereby leaking sensitive information inside the chip or disrupting the original function of the chip, making the entire system invalid. Because the pot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
Inventor 胡剑锋
Owner JIANGXI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products