Process type hardware Trojan horse monitoring method and device

A hardware Trojan horse, monitoring device technology, applied in the direction of measuring devices, measuring electricity, measuring electrical variables, etc., can solve the problems of low monitoring efficiency and inaccurate monitoring results, and achieve the effect of efficient and accurate monitoring

Active Publication Date: 2019-07-05
CHINA ELECTRONICS PROD RELIABILITY & ENVIRONMENTAL TESTING RES INST
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the problems of inaccurate monitoring results and low monitoring efficiency when the traditional hardware Trojan monitoring method is applied to technological hardware Trojan monitoring, and to provide a process-based hardware Trojan monitoring method with accurate monitoring results and high monitoring efficiency. device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process type hardware Trojan horse monitoring method and device
  • Process type hardware Trojan horse monitoring method and device
  • Process type hardware Trojan horse monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 Shown, a kind of technology type hardware Trojan horse monitoring method comprises steps:

[0022] S100: Determine key internal nodes in the chip to be tested and electrical parameter reference values ​​corresponding to each key internal node.

[0023] First of all, it is necessary to understand the attribute parameters of the chip to be tested and determine the key internal nodes in the chip to be tested. The key internal nodes in the chip under test refer to circuit nodes related to the overall function, performance or reliability of the chip under test. The step of determining the key internal nodes in the chip to be tested includes traversing the chip to be tested, searching for circuit nodes related to the overall function, performance or reliability of the chip to be tested, and using the found circuit nodes as key internal nodes in the chip to be tested. To put it simply, it is to conduct some routine research and testing on the chip to be test...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a technology type hardware Trojan virus monitoring method and apparatus. The method includes thefollowing steps: determining key inner nodes in a to-be-tested chip and an electrical parameter reference value corresponding to each key inner node, on the basis of an external test enabling signal, determining the test sequence of the key inner nodes, successively acquiring the electrical parameter of the key inner nodes, comparing the acquired electrical parameters and the corresponding electrical parameter reference values, counting the times when the key inner nodes have electrical parameters deviated from corresponding electrical parameter reference values, if the counting is continuously greater than a threshold value, determining the presence of Trojan virus in the to-be-tested chip. In the whole process, on one hand, the key inner nodes are monitored at regular times and the acquired electrical parameters are compared with the corresponding electrical parameter reference values, such that the method takes the influence of technology interface sufficiently into consideration, and can efficiently and accurately monitor the technology type hardware Trojan virus.

Description

technical field [0001] The invention relates to the technical field of Trojan horse monitoring, in particular to a process type hardware Trojan horse monitoring method and device. Background technique [0002] In recent years, the security of integrated circuits has received more and more attention. Due to cost reasons, the vast majority of integrated circuit design companies do not have their own manufacturing process lines, but rely on professional chip manufacturing foundries for chip production. This separation of design and production has brought hidden dangers to the security of integrated circuits—hardware Trojan horses, which refer to some malicious circuit logic added to chips by opponents during the design or manufacture of integrated circuits. It will lead to a series of security issues that are not controlled by the user during the use of the chip. [0003] At present, a method based on bypass analysis is usually used to monitor hardware Trojans. However, this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G01R31/28G06F21/76
CPCG01R31/2855G06F21/76
Inventor 王力纬池源恩云飞侯波何春华
Owner CHINA ELECTRONICS PROD RELIABILITY & ENVIRONMENTAL TESTING RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products