Hardware Trojan detecting and judging method based on distance measure distribution

A technology of hardware Trojan detection and distance measurement, which is applied to the protection of internal/peripheral computer components, etc., to achieve the effect of low cost, small amount of calculation, and fast detection speed

Active Publication Date: 2017-06-09
TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem of detecting whether there is a Trojan horse circuit in the hardware chip, and propose a hardware Trojan horse detection method based on the distance measure distribution, and use the fe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan detecting and judging method based on distance measure distribution
  • Hardware Trojan detecting and judging method based on distance measure distribution
  • Hardware Trojan detecting and judging method based on distance measure distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A hardware Trojan horse detection method based on distance measure distribution, the steps are as follows:

[0031] (1) According to FPGA hardware platform resource, the present invention has designed carrier circuit and Trojan horse circuit based on ISCAS'89 reference test circuit, selects the most suitable s9234 of platform as carrier circuit, and has selected the s27 that most meets this carrier circuit area ratio as Trojan horse circuit, the schematic diagram of the circuit structure is as follows figure 2 shown. The Clk clock is used as an external system clock, and rst_n provides a reset for the system. The module LFSR is used as a pseudo-random number generator to provide input for the carrier circuit, and at the same time provide input for the hardware Trojan circuit. The seed is provided for the pseudo-random number generator through seed, which is set to 8’b11111111. The Load signal determines whether to load the seed into the pseudo-random number generator...

Embodiment 2

[0044] A hardware Trojan horse detection method based on distance measure distribution, the steps are as follows:

[0045] Using the same chip and detection platform as in Example 1, change the distance measurement algorithm in Example 1, and use the angle cosine distance measurement method to measure the distance between the parent chip and the three Trojan horse chips in Example 1, and finally obtain The statistical results of the histogram of the distance measure distribution are shown in Fig. 3(b). The distance distribution between the mother chip and the Trojan chip under test implanted with the largest area (3.333%) Trojan horse circuit is in a completely different interval, and the distance distribution pattern has obvious differences, which can be completely distinguished, that is, the hardware Trojan can be measured; while the mother chip The chip and the chip under test implanted with a medium-area (1.523%) Trojan horse circuit have a certain overlap in the cosine di...

Embodiment 3

[0047] A hardware Trojan horse detection method based on distance measure distribution, the steps are as follows:

[0048] Using the same chip and detection platform as in Example 1, change the distance measurement algorithm in Example 1, and use the Mahalanobis distance measurement method to measure the distance between the parent chip and the three Trojan horse chips in Example 1, and finally obtain the distance The statistical results of the measure distribution histogram are shown in Fig. 3(c). It can be clearly seen that there are differences in the distance distribution of the three groups, but with the increase of the Trojan horse area, the distance distribution span of the female parent and the Trojan horse chip will be relatively reduced, but the distance distribution is still in different intervals, and the distance distribution patterns are obvious. The differences can be completely distinguished, and hardware Trojan chips of different areas can be detected.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware Trojan detecting and judging method based on distance measure distribution, comprising: subjecting side channel current signal sample data of a female parent chip to characteristic extraction to arrive at compression and dimension reduction for high-dimensional data, calculating distance measure matrixes of centers for a chip sample to be detected and the female parent chip samples, and judging whether three is hardware Trojan circuity embedded or not according to their similarity in distance distribution modes. The method detects samples based on the characteristics of distance measure distribution of mode recognition, has low calculating quantity, high detection speed and high reliability, and allows hardware Trojans to be detected and classified quickly; hardware devices used herein, such as a signal acquisition and detection platform, are low in cost, the algorithm is simple and easily implantable, and the method can meet the actual needs of different occasions.

Description

technical field [0001] The invention relates to the fields of information security and hardware Trojan detection, and relates to a method for detecting and discriminating a hardware Trojan in an integrated circuit chip, in particular to a method for detecting and discriminating a hardware Trojan based on a distance measure distribution method. Background technique [0002] With the rapid development of network and information technology, the demand for information security continues to increase, and information security is increasingly concerned and valued by people. People's earliest understanding of information security mainly comes from software Trojan horses and virus programs. With the development of anti-virus tools and software, the development space of software Trojan horses is becoming more and more limited. System-level Trojan horses, and even more research on how Trojan horses are combined with system core hardware to design and develop more concealed and difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/76
Inventor 苏静张中伟田祖宸刘建征
Owner TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products