Design method and system for anti-hardware Trojan horse chip

A chip design, hardware Trojan technology, applied in CAD circuit design, computing, special data processing applications, etc., can solve problems such as chip hardware Trojan attacks, and achieve the effect of increasing the conversion probability, increasing the probability of being activated, and improving the conversion probability.

Inactive Publication Date: 2017-08-04
宁波汉达信息科技有限公司 +1
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides an anti-hardware Trojan chip design method and system to solve the problem that the traditional chip design makes the chip vulnerable to hardware Trojan attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method and system for anti-hardware Trojan horse chip
  • Design method and system for anti-hardware Trojan horse chip
  • Design method and system for anti-hardware Trojan horse chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] see figure 1 , is a flow chart of an embodiment of the anti-hardware Trojan chip design method provided by the present application. Such as figure 1 As shown, the method includes:

[0023] S101. Obtain transition probabilities of internal nodes of the integrated circuit.

[0024] The integrated circuit contains many internal nodes, and the signal probability of each internal node is calculated, and the signal probability includes the input signal probability and the output signal probability. For a logic gate in an integrated circuit, the input probability of the initial internal node is generally known, and the output probability of the corresponding logic gate can be calculated through the input probability. For example, the signals of the two input internal nodes of a 2-input AND gate are known, and the probability of a high-level signal is 0.5, then the signal probability of a high-level signal output at the output is 0.5*0.5=0.25, then the output signal The pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a design method and system for an anti-hardware Trojan horse chip. The method comprises the following steps of: acquiring the conversion probability of internal nodes of an integrated circuit; forming a first node set by internal nodes, the conversion probability of which is smaller than a predetermined conversion probability threshold value; acquiring the minimal signal probability from the first node set and forming a second node set by the internal nodes, the logic depths of which are the smallest; and selecting corresponding internal nodes according to the quantity of the internal nodes in the second node set, and inserting the internal nodes into an and logic gate or an or logic gate. After the selected corresponding internal nodes are inserted into the and logic gate or the or logic gate, the conversion probability of corresponding nodes is increased, and the corresponding conversion probability of the whole integrated circuit is also increased, so that when the hardware Trojan horse selects nodes to insert, the probability that the hardware Trojan is activated is increased, so that the hardware Trojan horse cannot find proper insertion points to be inserted into the integrated circuit, and therefore, the risk that the integrated circuit is attached by the hardware Trojan horse is reduced.

Description

technical field [0001] The present application relates to the technical field of chip design, in particular to an anti-hardware Trojan chip design method and system. Background technique [0002] Chip design generally includes two parts: integrated circuit design and circuit packaging. Generally, the integrated circuit design is completed through integrated circuit research and development according to product requirements, and then the designed integrated circuit is packaged to complete the chip design. With the development of IP multiplexing technology, many functional modules of integrated circuits may also be purchased directly by designers from third-party IP design companies, rather than completely designed by themselves. This overall design and module design are independent of each other, as well as an industrial model in which design and production are separated. [0003] However, the above-mentioned design mode determines that there will be safety hazards in the ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50
CPCG06F30/39
Inventor 周彬吴新春孙彪徐力
Owner 宁波汉达信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products