A hardware Trojan horse detection method based on a chip temperature field effect

A hardware Trojan detection and field effect technology, applied in the field of chip hardware security, can solve the problems of difficult implementation and low detection rate, and achieve the effect of easy implementation

Inactive Publication Date: 2018-02-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above methods all have the disadvantages of low detection rate and difficult implementation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware Trojan horse detection method based on a chip temperature field effect
  • A hardware Trojan horse detection method based on a chip temperature field effect
  • A hardware Trojan horse detection method based on a chip temperature field effect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be understood that the implementations shown and described in the drawings are only exemplary, intended to explain the principle and spirit of the present invention, rather than limit the scope of the present invention.

[0030] The embodiment of the present invention provides a hardware Trojan detection method based on chip temperature field effect, such as figure 1 As shown, including the following steps S1-S3:

[0031] S1. Dividing the chip to be tested into grids, and measuring the temperature values ​​of each grid when the chip to be tested is running, to obtain a heat map of the chip to be tested.

[0032] S2. Training the neural network.

[0033] Such as figure 2 As shown, step S2 specifically includes the following sub-steps S21-S25:

[0034] S21. Inject the Trojan horse into the sample chip and keep the Trojan horse in an in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A hardware Trojan horse detection method based on a chip temperature field effect is disclosed. Based on the chip temperature field effect, a chip to be detected is firstly subjected to grid partition, then a test vector is inputted into the chip to be detected, the temperature in each grid of the chip during operation is measured to obtain a heat map of the chip, and the heat map is used for a neural network to identify Trojan horse information of the heat map. In addition, heat map sets of chips to which a Trojan horse is inputted and chips to which no Trojan horse is inputted are utilized to train the neural network, and then the trained neural network is utilized to detect the chip to be detected so as to determine whether a Trojan horse is inputted to the chip to be detected. The method has characteristics of a high detection rate and easy implementation, and can ensure correct detection of a hardware Trojan horse.

Description

technical field [0001] The invention belongs to the technical field of chip hardware security, and in particular relates to the design of a hardware Trojan horse detection method based on the chip temperature field effect. Background technique [0002] Trojan horse implantation is a certain circuit structure maliciously inserted into an integrated circuit, which can change circuit functions, leak circuit information, or cause circuit denial of service, etc., which poses a great threat to hardware security. However, because the hardware Trojan occupies a small area and is inactive for a long time, it is almost impossible to detect. [0003] At present, the common methods proposed by the academic circles for hardware Trojan detection include logic testing, test design, side channel analysis, reverse engineering, and the like. The test design is to insert an extra test circuit into the chip in order to detect the hardware Trojan horse. These test circuits can only detect hard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01N25/72G06N3/04G06N3/08
CPCG06N3/08G01N25/72G06N3/048
Inventor 郭世泽王坚陈哲
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products