Hardware trojan detection method and system based on time delay

A hardware Trojan detection and hardware Trojan technology, applied in electronic circuit testing and other directions, can solve problems such as increasing workload and testing cost, and achieve high practical application value, improve testing efficiency, and reduce workload and testing costs.

Active Publication Date: 2015-09-30
FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional hardware Trojan detection based on bypass signal analysis needs to insert shadow registers or ring oscillators in the critical path of the integrated circuit to characterize the delay characteristics of the chip or scan and monitor the clock of the critical path. When the integrated circuit has more than one million path, the hardware Trojan may not necessarily be parasitic in the critical path, so inserting shadow registers or ring oscillators into the critical path or performing clock scan monitoring may not be able to detect the hardware Trojan. If you increase the detection of non-critical paths, you need to add Additional chip area for testing will greatly increase workload and test cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware trojan detection method and system based on time delay
  • Hardware trojan detection method and system based on time delay
  • Hardware trojan detection method and system based on time delay

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0023] In one embodiment, based on the time-delayed hardware Trojan detection method, such as figure 1 shown, including the following steps:

[0024] Step S101: Obtain bypass delay information of the chip under test, the bypass delay information including amplitude-frequency response curves and / or phase-frequency response curves of each signal path of the chip under test;

[0025] Step S102: Obtain the resonant valley frequency and resonant peak frequency of each signal path in the chip under test according to the bypass delay information;

[0026] Step S103: Comparing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware trojan detection method and system based on time delay. The method comprises the following steps of firstly obtaining bypass time delay information of a chip to be detected, wherein the bypass time delay information includes an amplitude frequency response curve and/or a phase frequency response curve of each signal path of the chip to be detected; obtaining the resonance valley frequency and the resonance peak frequency of each signal path in the chip to be detected according to the bypass time delay information; finally and respectively comparing the resonance valley frequency and the resonance peak frequency of each signal path in the chip to be detected with the corresponding preset resonance valley frequency threshold and the resonance peak frequency threshold of each signal path; judging whether hardware Trojan exists in the chip to be detected or not according to the comparison result. The addition of the additional chip area for test is not needed, the workload and the test cost are greatly reduced, and the work efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of integrated circuit detection, in particular to a delay-based hardware Trojan detection method and system. Background technique [0002] With the development of semiconductor technology, hardware outsourcing design and tape-out has become a global trend. In recent years, a new type of hardware attack method targeting integrated circuit chips has emerged, called "hardware Trojan horse". Hardware Trojans mainly refer to artificially maliciously adding some illegal circuits or tampering with original design files in the process of IC (integrated circuit, integrated circuit) design and manufacturing, thereby leaving "time bombs" or "electronic backdoors". [0003] The existing hardware Trojan detection method mainly judges whether there is a Trojan in the chip by detecting and analyzing the bypass signal in the circuit, such as the maximum operating frequency, delay, power consumption, static and dynamic curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
Inventor 何春华侯波王力纬恩云飞谢少锋
Owner FIFTH ELECTRONICS RES INST OF MINIST OF IND & INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products