Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware Trojan horse detection system and detection method thereof

A hardware Trojan detection and detection method technology, applied in the field of integrated circuit chip detection, can solve the problems of bypass signal noise interference, large differences in simulation environments, difficult simulation conclusions, etc., and achieve the effects of improving quality, high detection accuracy, and high quality

Inactive Publication Date: 2017-02-15
PEOPLES LIBERATION ARMY ORDNANCE ENG COLLEGE
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the main problems of the hardware Trojan detection method based on bypass analysis include: (1) The verification experiment generally adopts the simulation method, mainly using the HSPICE environment and the ISCAS standard library for simulation
However, in the actual experiment, the bypass signal is seriously disturbed by noise, which is quite different from the simulation environment, making it difficult to reproduce the simulation conclusion in the actual experiment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection system and detection method thereof
  • Hardware Trojan horse detection system and detection method thereof
  • Hardware Trojan horse detection system and detection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The standard parts used in the present invention can be purchased from the market, and the special-shaped parts can be customized according to the instructions and the accompanying drawings. The specific connection methods of each part adopt mature bolts, rivets, welding in the prior art , pasting and other conventional means, no longer described in detail here.

[0049] See attached figure 1 , the present embodiment includes a controller 1, the controller 1 is connected with the digital oscilloscope 2 through the USB communication line 6, the controller 1 is connected with the test board 3 through the RS232 communication line 7, and the test board 3 is provided with a regulated power supply 4, The test board 3 is connected with the digital oscilloscope 2 through the measuring resistor 5 .

[0050] A detection method using the above-mentioned hardware Trojan detection system, comprising the following steps:

[0051] A. Calculate the resistance boundary of the measured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan horse detection system. The hardware Trojan horse detection system comprises a controller, wherein the controller is connected with a digital oscilloscope through a USB communication line; the controller is connected with a test board card through an RS232 communication line; the test board card is provided with a stabilized voltage supply; and the test board card is connected with the digital oscilloscope through a measuring resistor. The invention also provides a detection method used for the hardware Trojan horse detection system. The disadvantages in the prior art can be solved, and the precision of hardware detection is improved.

Description

technical field [0001] The invention relates to the technical field of integrated circuit chip detection, in particular to a hardware Trojan horse detection system and a detection method thereof. Background technique [0002] With the further globalization of semiconductor design, manufacturing and use, especially the increasing popularity of hardware manufacturing outsourcing, integrated circuit (IC) chips are vulnerable to various types of malicious attacks, especially "Hardware Trojan" ". The so-called hardware Trojan horse is a malicious circuit formed by changing the original design of an IC to achieve the goals of function tampering, specification tampering, and information leakage. It can easily break through the existing security protection system and pose a huge threat. Hardware Trojan horses have the characteristics of exquisite design and strong concealment. Traditional chip testing methods such as physical inspection and functional testing are not up to the task...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76G06F21/75
CPCG06F21/75G06F21/76
Inventor 张阳李雄伟陈开颜全厚德谢方方韩月霞李艳孙海涛王晓晗徐璐
Owner PEOPLES LIBERATION ARMY ORDNANCE ENG COLLEGE