Hardware trojan horse detection method based on few-state point analysis

A technology of hardware Trojan detection and point analysis, applied in the direction of platform integrity maintenance, etc., can solve the problems of insignificance, small hardware Trojan circuit scale, and non-negligible impact, and achieve the effects of strong applicability, low detection cost, and improved recognition efficiency

Active Publication Date: 2015-11-11
NAT UNIV OF DEFENSE TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the acquisition process of bypass information is easily disturbed by factors such as noise, and the scale of the hardware Trojan horse circuit is usually relatively small, and it is basically in a "sleeping" state when it is not touched. Therefore, the bypass information generated by it is relatively small. even insignificant
On the other hand, with the continuous reduction of IC feature size, the impact of noise on bypass information has reached a level that cannot be ignored, which brings severe challenges to hardware Trojan horse detection technology based on bypass information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware trojan horse detection method based on few-state point analysis
  • Hardware trojan horse detection method based on few-state point analysis
  • Hardware trojan horse detection method based on few-state point analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] It has become one of the mainstream design methods to find the few state points in the circuit and use these few state points as the trigger logic hardware Trojan design method. Hardware Trojans often use fewer state points to attack during the design and implantation process, thereby increasing the probability of successful attack and concealment. And for the multi-point trigger technology, the functional logic of its hardware Trojan horse will not be activated when the circuit is working normally. That is to say, even if some designers will specially hide the Trojan horse circuit, the trigger point of its functional logic is not related to the entire function. Logic must be less stateful. Therefore, the present invention is based on the above principles, and analyzes the hardware Trojan horse attack by locating and statistic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A hardware trojan horse detection method based on few-state point analysis comprises the steps of: S1: integrating RTL-level suspicious codes to obtain a gate-level net list of a circuit; S2: applying random excitation to the gate-level net list obtained by integration and checking a turn-over rate; if the turn-over rate is 100%, judging that the circuit does not have trojan horse therein; if the turn-over rate does not reach 100%, primarily judging that the circuit possibly has the trojan horse and going to the step S3; and S3: analyzing data of the turn-over rate in details to find out a few-state point which is rarely turned over, if the distribution of the few-state points is relatively discrete, primarily judging that the circuit does not have the trojan horse therein, and if the distribution of the few-state points is relatively concentrated, primarily judging that the circuit possibly has the trojan horse. The hardware trojan horse detection method based on the few-state point analysis has the advantages of easiness for implementation, high recognition efficiency, low detection cost and the like.

Description

technical field [0001] The invention mainly relates to the field of chip safety detection, in particular to a hardware Trojan horse detection method based on few-state point analysis. Background technique [0002] As an important component in today's computer and electronic fields, integrated circuits (ICs) are increasingly complex. As the foundation of the information industry, their safety and reliability are of great significance. In the 1990s, due to the rapid development of integrated circuit manufacturing technology, the scale of chip design has greatly increased, and the complexity of chips has increased sharply, resulting in a large gap between the ability of designers and the complexity required by chips. To bridge this gap, designers have adopted simplified chip design processes to shorten design cycles. This has led to the emergence of many IP suppliers, specializing in providing reusable integrated circuit modules for third parties. The separation of integrated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 李少青石磊陈吉华张明乐大珩何小威马卓隋强赵志勋贺亚娟周二瑞
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products