Circuit security testable design method capable of detecting inactive hardware Trojan horse and detecting method of hardware Trojan horse

A hardware Trojan horse and design method technology, applied in computer security devices, computing, electrical digital data processing and other directions, can solve problems such as difficult detection

Active Publication Date: 2015-09-30
58TH RES INST OF CETC
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above two types of methods can detect a certain type of specific hardware Trojan to a certain extent, but both rely on the need to trigger the hardware Trojan or require the hardware Trojan to be in a working state all the time,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Circuit security testable design method capable of detecting inactive hardware Trojan horse and detecting method of hardware Trojan horse
  • Circuit security testable design method capable of detecting inactive hardware Trojan horse and detecting method of hardware Trojan horse
  • Circuit security testable design method capable of detecting inactive hardware Trojan horse and detecting method of hardware Trojan horse

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0026] Design for Testability (DFT, Design for Testability) is a very important part of integrated circuit design. It is mainly used to detect whether there are manufacturing defects in the chip during the manufacturing process, which affects the function of the circuit and the yield. And people have developed a variety of DFT techniques to more effectively detect defects in chip manufacturing. However, for the security detection of whether there is a hardware Trojan in the integrated circuit, there is no general and standard process such as DFT at present. Moreover, current technologies for hardware Trojan detection, such as logic testing and bypass analysis and detection, all rely on such a prerequisite, that is, the hardware Trojan in the circuit is triggered or is in a working state. However, there is a type of hardware Trojan that does not affect the func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a circuit security testable design method capable of detecting an inactive hardware Trojan horse and a detecting method for the hardware Trojan horse. Firstly, the design and the verification on an original circuit are completed. Secondly, a security testing mode is added for the circuit, the clock frequency under the security testing mode is great less than the working frequency of the circuit, and work such as corresponding compositing, locating and wiring, timing sequence analyzing and designing is finished. In the chip testing process, the security testing mode is in use, and by means of a security testing clock with the using frequency which is great less than a functional clock, the dynamic power consumption during whole circuit running is lowered, so that the proportion of the static power consumption of the hardware Trojan horse in an idle state on the whole circuit power consumption is increased, and detecting on the hardware Trojan horse which is in a sleep mode is achieved.

Description

technical field [0001] The invention relates to a circuit security testability design method capable of detecting inactive hardware Trojan horses and a detection process for hardware Trojan horses, especially a design that makes hardware Trojan horses easier to detect by adding additional circuits in the circuit design stage The method and detection process are especially suitable for detecting hardware Trojans that are in a dormant state for a long time. Background technique [0002] With the development of the integrated circuit industry towards global cooperation, more and more third parties are involved in the integrated circuit industry chain, which makes more and more uncontrolled factors in the design and manufacturing process of integrated circuits. This raises concerns about the security of integrated circuits. Due to the participation of third-party uncontrolled links, integrated circuits are easily modified maliciously and implanted into hardware Trojan horses du...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/567
Inventor 于宗光周昱雷淑岚王淑芬张荣魏敬和
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products