An RTL hardware Trojan detection method based on the recursive descent algorithm

A technology of hardware Trojan detection and recursive descent, applied in the field of RTL-level code security analysis, to improve work efficiency and shorten test time

Active Publication Date: 2017-02-15
58TH RES INST OF CETC
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the research on code security at the RTL level or gate level is basically blank. Therefore, for the above-mentioned design defects, the security path verification technology is carried out to detect whether there are illegal external access in the RTL code, and whether it does not meet the definition of security rules. It is feasible and practical to ensure that the RTL code does not contain such a hidden path that can leak the confidential information inside the circuit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An RTL hardware Trojan detection method based on the recursive descent algorithm
  • An RTL hardware Trojan detection method based on the recursive descent algorithm
  • An RTL hardware Trojan detection method based on the recursive descent algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiments listed in the present invention are only used to help understand the present invention, and should not be interpreted as limiting the protection scope of the present invention. For those of ordinary skill in the art, they can also Improvements and modifications are made to the present invention, and these improvements and modifications also fall within the protection scope of the claims of the present invention.

[0020] The present invention will be further described below in conjunction with accompanying drawing.

[0021] The invention provides a RTL level hardware Trojan detection method based on a recursive descent algorithm. According to the Trojan model, RTL code rules are designed, and word types are specified, including module declaration words, module end declaration words, signal declaration words, logic function block declaration words, The middle word and the terminator are used to analyze the RTL file and find out the Trojan horse modules th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an RTL hardware Trojan detection method based on the recursive descent algorithm. The detection method is characterized by designing RTL code rules according to a Trojan model, appointing word types including module declaration words, module end declaration words, signal declaration words, logic function block declaration words, middle words and closing words, and analyzing RTL files by using the recursive descent algorithm to find Trojan modules meeting the rules. The detection method is aimed at specific types of RTL code level hardware Trojans; compared with conventional method of detecting hardware Trojans on chips, the detection method shortens experiment time greatly, can detect RTL code level hardware Trojans effectively and rapidly and locate Trojans accurately, and increases working efficiency.

Description

technical field [0001] The invention relates to the technical field of RTL-level code security analysis, in particular to an RTL-level hardware Trojan horse detection method based on a recursive descent algorithm. Background technique [0002] Incidents such as "Snowden Prism Gate" and "Iran Stuxnet" in recent years have shown that hardware Trojan horses in integrated circuits can be used as a weapon to carry out information warfare, network warfare, and even physically destroy military equipment and key facilities, seriously threatening national security. With the increasingly complex design of integrated circuits and high manufacturing costs, the integrated circuit industry is developing towards global cooperation. For a long period of time in the future, integrated circuits will still face numerous and uncontrollable first Three-party IP, foreign EDA software, and the threat of uncontrollable wafer manufacturing. In these links, integrated circuits are likely to be modi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/561G06F21/563
Inventor 王丽娟张荣周昱杨露
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products