Hardware Trojan horse detection method, device and system
A hardware Trojan detection and Trojan technology, applied in the field of information security, can solve the problems of low resolution of hardware Trojan detection, electromagnetic signal influence, annihilation of measurement noise and process deviation, etc., to reduce data analysis time, high versatility, and save memory resources Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0027] The existing hardware Trojan detection process mainly analyzes the correlation of electromagnetic signals, and determines whether there is a hardware Trojan on the chip according to the analysis results. Since the scale of the hardware Trojan horse circuit can be large or small, when the scale of the hardware Trojan horse electric furnace is small, the influence of the electromagnetic signal generated by the hardware Trojan horse on the chip will be lost in the measurement noise and process deviation, resulting in only a single electromagnetic signal. It will be difficult to find the existence of a hardware Trojan through analysis. Therefore, hardware Trojan detect...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


