Hardware Trojan horse detection method based on neural network

A hardware Trojan detection and neural network algorithm technology, applied in neural learning methods, biological neural network models, neural architecture, etc., can solve the problem of insignificant physical feature representation, insignificant influence of circuit bypass information, and bypass information of hardware Trojans. Problems such as difficult detection technology, to achieve the effect of universality, fast detection speed, and high recognition

Inactive Publication Date: 2018-05-18
TIANJIN UNIV
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of hardware Trojan horse design technology, the new hardware Trojan horse implantation method is ingenious at this stage, and the size is smaller, and the impact on circuit bypass information is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on neural network
  • Hardware Trojan horse detection method based on neural network
  • Hardware Trojan horse detection method based on neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039]Due to the shrinking size of hardware Trojans, as well as the influence of process noise and test errors, the sensitivity of hardware Trojan bypass detection technology is affected, so that hardware Trojans that have little influence on circuit bypass information cannot be detected. In order to improve the detection efficiency of a hardware Trojan, the present invention proposes a method for detecting a hardware Trojan based on a neural network. The method collects the bypass information in the working process of the original circuit and the circuit to be tested, and processes the data through the neural network learning algorithm to realize the obvious distinction of the two types of circuit data, thereby realizing the detection of the hardware Trojan horse.

[0040] Regarding the detection of hardware Trojan horses, various countries have carried out a large number of researches. However, with the increase of the integrated circuit scale and the increasingly sophistica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of integrated circuit credibility detection and aims to improve detection efficiency of a hardware Trojan horse and realize obvious distinction of two types of circuit data so as to realize detection of the hardware Trojan horse. According to a hardware Trojan horse detection method based on a neural network, a training neural network algorithm is utilized to process bypass information, so that recognition of the hardware Trojan horse is realized, wherein the neural network is a self-organized neural network, network parameters are automatically corrected continuously by finding the internal law of input samples, automatic classification of the input samples is realized, and competitive learning is adopted as the network learning rule; and structurally, the self-organized neural network only contains two layers of neurons, wherein the first layer is an input layer, the second layer is a competitive layer, namely an output layer, and the neurons of the two layers are completely interconnected. The method is mainly applied to integrated circuit detection.

Description

technical field [0001] The invention relates to the technical field of integrated circuit trustworthiness detection, in particular to a hardware Trojan horse detection method based on a neural network learning algorithm, which can effectively detect a hardware Trojan horse in combination with bypass analysis technology. Background technique [0002] With the rapid development of electronic design automation technology and semiconductor manufacturing technology, the number of transistors integrated in a single integrated circuit chip is increasing, and its functions are becoming more and more powerful. As a result, integrated circuit chips are widely used in various fields of modern technology, especially in In sensitive fields such as financial equipment, mobile communication, transportation, government and energy, integrated circuits play an increasingly important role in promoting social progress and economic development. [0003] With the development of the integrated cir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/76G06N3/04G06N3/08G01R31/28
CPCG06F21/76G06N3/08G01R31/2851G06N3/045
Inventor 赵毅强解啸天刘燕江高翔
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products