Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware Trojan horse detection method, device and system

A hardware Trojan detection and Trojan technology, applied in the field of information security, can solve the problems of low resolution of hardware Trojan detection, electromagnetic signal influence, annihilation of measurement noise and process deviation, etc., to reduce data analysis time, high versatility, and save memory resources Effect

Active Publication Date: 2019-11-05
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, it is found that the prior art has at least the following problems: because when the scale of the hardware Trojan is small, the influence of the electromagnetic signal produced by the hardware Trojan on the chip will often be lost in the measurement noise and process deviation
At this time, if only the correlation of a single electromagnetic signal is analyzed, it will be difficult to find the existence of hardware Trojans, resulting in low detection resolution of hardware Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method, device and system
  • Hardware Trojan horse detection method, device and system
  • Hardware Trojan horse detection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0027] The existing hardware Trojan detection process mainly analyzes the correlation of electromagnetic signals, and determines whether there is a hardware Trojan on the chip according to the analysis results. Since the scale of the hardware Trojan horse circuit can be large or small, when the scale of the hardware Trojan horse electric furnace is small, the influence of the electromagnetic signal generated by the hardware Trojan horse on the chip will be lost in the measurement noise and process deviation, resulting in only a single electromagnetic signal. It will be difficult to find the existence of a hardware Trojan through analysis. Therefore, hardware Trojan detect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware Trojan detection method, device and system and belongs to the technical field of information safety. The method comprises the steps that an electromagnetic signal leaked by a target chip in operation is detected; according to the detected electromagnetic signal, a corresponding target electromagnetic signal record is obtained; according to the target electromagnetic signal record, a corresponding detection result of the target chip is obtained through a Trojan detection support vector machine based on pre-training. According to the hardware Trojan detection method, device and system, through the Trojan detection support vector machine based on the pre-training, based on the detected leaked target electromagnetic signal record, the detection result corresponding to the target chip is obtained. Because hardware Trojan is automatically detected by a great number of collected electromagnetic signals through the pre-trained hardware Trojan detection support vector machine, the hardware Trojan is not found only by analyzing association of a single electromagnetic signal, and therefore on the basis of training a great number of the electromagnetic signals, an electromagnetic signal influence on the chip by the hardware Trojan can be found. Thus, the hardware Trojan detection resolution is higher.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, to a hardware Trojan detection method, device and system. Background technique [0002] With the continuous advancement of chip manufacturing technology, the cost of establishing and maintaining a cutting-edge chip manufacturing plant is getting higher and higher. For example, it costs nearly $3 billion to build a 12-inch, 65nm chip manufacturing plant today. This has resulted in the separation of the chip design process and the manufacturing process, that is, after the chip designer completes the circuit design, the final design data is delivered to the chip manufacturer, and the manufacturer is responsible for specific processing and production. The above-mentioned status quo has caused the chip manufacturing process to be out of the control of the designer, making the chip very vulnerable to sabotage or malicious modification by opponents. For thos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/76G06F21/56
CPCG06F21/567G06F21/76
Inventor 张洪欣米芳甘罕王振友朱瑞
Owner BEIJING UNIV OF POSTS & TELECOMM