Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Testing vector generating method based on variation analysis for effectively activating hardware trojan horses

A technology of test vectors and hardware Trojan horses, applied in error detection/correction, instrumentation, electrical digital data processing, etc., can solve the problems of identifying hardware Trojan horses, flooding, and difficulty, and achieve high test efficiency, strong purpose, and methods mature effect

Pending Publication Date: 2018-03-09
TIANJIN UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Small-area hardware Trojans are easily overwhelmed by process noise, and it is difficult for us to identify the characteristics of hardware Trojans from the bypass information submerged in noise. Process noise is the main bottleneck to further improve detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Testing vector generating method based on variation analysis for effectively activating hardware trojan horses
  • Testing vector generating method based on variation analysis for effectively activating hardware trojan horses
  • Testing vector generating method based on variation analysis for effectively activating hardware trojan horses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention proposes a method for generating test vectors based on mutation analysis for effective activation of hardware Trojan horses, using methods of software testing and locating program loopholes to locate the implantation point of the hardware Trojan horse—the low-activity node, and targeting at the implantation point of the hardware Trojan horse Screening test vectors that can effectively activate hardware Trojan horses, this method has strong purpose, low test cost, high test efficiency, more streamlined test sequences, and more effective activation of hardware Trojan horses. The analysis has certain practical significance and reference value.

[0035] The present invention is on the basis of software testing, combined with the concealment characteristics of hardware Trojan horses, proposes a test vector generation method that utilizes mutation analysis to effectively activate hardware Trojan horses, analyzes the structural characteristics of the mothe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of credibility of integrated circuits, and discloses a testing vector generating method for effectively activating hardware trojan horses. The method is high in purposiveness, low in testing cost, high in testing efficiency and capable of more effectively activating the hardware trojan horses and has certain actual meaning and reference value for manifesting the hardware trojan horses and analyzing bypass signals, and generated testing sequences are more simplified. In order to achieve the advantages above, according to the adopted technical scheme,the testing vector generating method based on the variation analysis for effectively activating the hardware trojan horses comprises the steps of analyzing the structural characters of a mother circuit, screening out nodes with low activity, utilizing a variation method to execute a variation operation on the circuit structure of the nodes with the low activity to generate high-level variants, and utilizing a functional testing method to screen out testing vectors capable of killing the variants. The method is mainly applied to the safety detection occasion of an integrated circuit.

Description

technical field [0001] The invention relates to the technical field of trustworthiness of integrated circuits, in particular to a method for generating test vectors for effective activation of hardware Trojan horses based on variation analysis. Background technique [0002] With the rapid development of deep submicron integrated circuit technology and computer-aided design technology, integrated circuits are widely used in the fields of finance, transportation, communication and national defense, and have gradually become an indispensable part of national life. In addition, with the deepening of the wave of economic globalization, semiconductor manufacturers have accelerated the time to market of integrated circuit chips in order to quickly occupy market share and increase revenue and profits. separate from manufacturing. Usually, the design and manufacturing process of an integrated circuit chip requires the joint cooperation of multiple units, some of which involve the as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/263
CPCG06F11/263
Inventor 赵毅强刘燕江解啸天何家骥刘阿强
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products