Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Hardware Trojan detecting method based on circuit characteristic analysis

A technology of hardware Trojan detection and hardware Trojan, applied in the direction of internal/peripheral computer component protection, etc., can solve the problem of difficult detection of hardware Trojan, long time, reaching the order of tens of hours or even days, and the inability to know which combinational logic circuit blocks to merge, etc. problem, to achieve the effect of reducing impact, reducing running time, and improving scalability

Active Publication Date: 2015-08-19
TSINGHUA UNIV
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above method of analyzing combinational logic circuits suffers from several problems
The first is the complexity problem: analyzing combinational logic circuits leads to almost exponential computational complexity, which makes the detection time too long, reaching the order of tens of hours or even days
The second is the detection situation of hardware Trojans in sequential circuits: since the combinatorial logic circuit in sequential circuits is divided into scattered combinatorial logic circuit blocks by flip-flops, if a certain hardware Trojan consists of multiple combinatorial logic circuit blocks, the analysis of combinatorial logic The method cannot know which combinational logic circuit blocks should be combined, so it is difficult to detect such hardware Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan detecting method based on circuit characteristic analysis
  • Hardware Trojan detecting method based on circuit characteristic analysis
  • Hardware Trojan detecting method based on circuit characteristic analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0027] A hardware Trojan horse detection method based on circuit feature analysis according to an embodiment of the present invention will be described below with reference to the accompanying drawings.

[0028] figure 1 It is a flowchart of a hardware Trojan horse detection method based on circuit feature analysis according to an embodiment of the present invention. like figure 1 As shown, the method includes the following steps:

[0029] Step S101, inputting the circuit to be tested, and obtaining a high-level description file of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware Trojan detecting method based on circuit characteristic analysis. The hardware Trojan detecting method includes steps of inputting a detected circuit and acquiring a high-level modeling file of the detected circuit; identifying functional modules in the detected circuit according to the high-level modeling file of the circuit to be detected so as to judge reliability of the functional modules, and marking the detected circuit when the functional modules are reliable; extracting classification features from the marked detected circuit, matching each type of hardware Trojan characteristics in a preset hardware Trojan circuit characteristic database and outputting characteristic analysis results of classes according to the matching results; comprehensively analyzing the characteristic analysis results of classes so as to obtain reliability information of the detected circuit. By the hardware Trojan detecting method, hardware Trojan detecting speed is effectively increased as well as discrimination degree of the detecting area of different types of hardware Trojan, and detection effect of hardware Trojan in the time sequencing circuit is effectively improved.

Description

technical field [0001] The invention relates to the technical field of computers and electronic information, in particular to a hardware Trojan horse detection method based on circuit feature analysis. Background technique [0002] The current integrated circuit chip can be composed of billions of transistors. In the process of chip design and manufacturing, if some malicious modules are implanted in the chip used or the third-party IP core, it will be difficult to check it out. As far as users are concerned, there will be uncontrolled security issues, leading to information leakage, chips being left behind, or abnormal chips failing, resulting in extremely serious consequences. This problem is the hardware security problem that people pay more and more attention to in recent years. Malicious circuits other than normal circuits are called "hardware Trojans". [0003] As the scale of System on Chip (SoC) becomes larger and the design cycle for chip products to be put into t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 姚颂陈晓明汪玉杨华中
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products