Hardware Trojan side channel detection method based on electromagnetism and delay

A technology of hardware Trojan horse and detection method, which is applied in the direction of electronic circuit testing, measuring electronics, measuring devices, etc., can solve the problems of small area, strong latentness, and inability to clear, and achieve improved resolution of differences, effective detection, and simple methods easy effect

Active Publication Date: 2017-06-20
TIANJIN UNIV
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More and more third-party companies and personnel are involved. The chip is not completely autonomous and controllable during the processing process. Attackers can tamper with the original circuit design at any stage to form a malicious circuit. Its area is small and latent. Conventional The detection method is difficult to detect and cannot be cleared. Once the hardware Trojan horse is activated, the attacker will easily obtain the key information in the chip, make the chip work abnormally, and even gain control of the entire information system through the chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan side channel detection method based on electromagnetism and delay
  • Hardware Trojan side channel detection method based on electromagnetism and delay
  • Hardware Trojan side channel detection method based on electromagnetism and delay

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Complete technical scheme of the present invention is as follows:

[0052] figure 1 It is a flow chart of a hardware Trojan horse side channel detection method based on electromagnetic and delay, and the method mainly includes the following steps:

[0053] (1) Perform side-channel tests on all chips to be tested, and collect side-channel information of the chips to be tested: use the side-channel acquisition platform to collect the electromagnetic information leaked by the circuit in the working state and the delay information of a certain path multiple times.

[0054] (2) Preprocessing the side channel information of all chips under test: smoothing and filtering the electromagnetic information and delay information collected multiple times by all chips under test to obtain smooth electromagnetic information and delay information. Divide the electromagnetic information and delay information of the chip to be tested into n intervals, and perform derivation processing on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware Trojan detection technology based on electromagnetism and delay, and aims to realize hardware Trojan detection by use of electromagnetism information and delay information leaked by a chip in a working state. According to a hardware Trojan bypass detection method based on electromagnetism and delay of the invention, the corresponding proportional relationship between the current I(tot, m) consumed by a Trojan chip m and the maximum working frequency f(max, m) of a path is as follows: I(tot, m)/f(max, m) is approximately equal to n(tot, m)*k(g)*n(cri, m)*beta(g). A path has n(cri, m) switching tubes, there are n(tot, m) switching tubes working at the moment, and n(tot, m)>=n(tot, g). If a hardware Trojan is inserted onto a current path, n(cri, m)>=n(cri, g), or, n(cri, m)=n(cri, g). If a hardware Trojan is implanted onto the path, the maximum working frequency f(max, m) is proportional to the current I(tot, m) consumed, and identification can be carried out on the basis. The method is mainly applied to an occasion of delay design and manufacture of integrated circuits.

Description

technical field [0001] The invention relates to the technical field of integrated circuit trustworthiness detection, in particular to a hardware Trojan horse side channel detection method based on the corresponding relationship between electromagnetic and delay. Background technique [0002] With the rapid development of electronic design automation technology and semiconductor manufacturing technology, the number of transistors integrated in a single integrated circuit chip is increasing, and its functions are becoming more and more powerful, so integrated circuit chips are widely used in various fields of modern technology, especially National security, military, communications, finance, transportation and other industries related to the lifeline of the country have become strategic, basic and leading industries supporting economic and social development. [0003] In today's globalization of business, in order to shorten the design cycle of integrated circuits and reduce m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R31/28
CPCG01R31/2855
Inventor 赵毅强刘燕江解啸天何家骥刘阿强
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products