Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Single-trigger hardware trojan horse detection method based on gate-level structure characteristics

A hardware Trojan detection and structural feature technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of limiting the generality and feasibility of the method, the high complexity of the score accumulation algorithm, and the high misjudgment rate of Trojan horse detection, and achieve improved scores Calculation method, reduction of detection time, and effect of reduction of detection complexity

Inactive Publication Date: 2018-04-06
TIANJIN UNIV
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In existing hardware Trojan detection methods based on static features, the higher the degree of circuit abstraction, the more circuit information is lost, which often leads to a high misjudgment rate in Trojan detection based on combinational logic circuit design.
[0004] The score accumulation algorithm in reference [5] has high complexity. For a circuit with a circuit scale of 160,000 gates, the detection time reaches 2000 seconds, which limits the generality and feasibility of the method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single-trigger hardware trojan horse detection method based on gate-level structure characteristics
  • Single-trigger hardware trojan horse detection method based on gate-level structure characteristics
  • Single-trigger hardware trojan horse detection method based on gate-level structure characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings.

[0038] The detection steps of the present invention for the hardware Trojan horse circuit in the circuit to be tested are as attached figure 1 shown.

[0039] Specifically, input the circuit to be tested; judge whether the circuit to be tested is a netlist form circuit, if it is a netlist form circuit, proceed to the next step, if not, use a synthesis tool to synthesize the test circuit into a netlist form circuit , followed by the next step; the circuit in the form of a netlist is abstracted into a directed acyclic graph, wherein in the directed acyclic graph, the nodes represent the logic gates in the netlist circuit, and the edges represent the connections between the logic gates in the netlist circuit Connect; match the directed acyclic graph with the Trojan horse feature library, and accumulate the scores as required during the matching process; get the score seq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a single-trigger hardware trojan horse detection method based on gate-level structure characteristics. The single-trigger hardware trojan horse detection method comprises the following steps that 1, based on an existing hardware trojan horse reference circuit, the structure characteristics of single-trigger type hardware trojan horses are abstracted to form a hardware trojan horse structure library; 2, unknown circuits (3) to be detected are input to obtain corresponding netlist-form circuits; 4, the netlist-form circuits are abstracted into directed graphs; 5, fractionsequences of all logic gates in the circuits are obtained; 6, a preset abnormal value recognition algorithm is used for marking abnormal values in the fraction sequences, and the logic gates corresponding to abnormal fractions are added into a final trojan horse suspicious logic gate set. By adopting the method, trigger circuit characteristics of single-trigger type hardware trojan horses can bemore accurately abstracted, meanwhile a fraction accumulation algorithm is improved, namely the hardware trojan horse detecting time is effectively shortened while all the information of circuits is retained, and the hardware trojan horse detecting accuracy rate is improved.

Description

technical field [0001] The invention relates to the technical fields of computer and electronic information, in particular to a single-trigger hardware Trojan horse detection method based on gate-level circuit structure features. Background technique [0002] Integrated circuits are developing towards the scale of hundreds of millions of gates, and the separation of design and manufacturing has become a trend. It is inevitable to use a large number of third-party IP cores in the design, thus shortening the design cycle. However, the extensive use of unreliable third-party IP cores may lead to potential security risks, one of which is hardware Trojan horses. A hardware Trojan horse is a redundant circuit inserted into a normal circuit, which can cause damage to the circuit, leak information, and accelerate loss. The mainstream hardware Trojan detection methods include logic testing [1] and side channel analysis [2]. The logic test method needs to generate a large number of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 陈富强刘强
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products