Hardware-Trojan-horse detection method based on side-channel analysis

A technology for hardware Trojan detection and side channel analysis, applied in the protection of internal/peripheral computer components, instrument, platform integrity maintenance, etc., can solve problems such as low efficiency and poor reliability, and achieve the effect of improving detection efficiency

Inactive Publication Date: 2018-05-22
BEIJING ELECTRONICS SCI & TECH INST
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, many hardware Trojan detections at this stage do not have a concise and unified detection platform. Many hardware Trojan detection methods re

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware-Trojan-horse detection method based on side-channel analysis
  • Hardware-Trojan-horse detection method based on side-channel analysis
  • Hardware-Trojan-horse detection method based on side-channel analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the implementations shown in the drawings, but it should be noted that these implementations are not limitations of the present invention, and those of ordinary skill in the art based on the functions, methods, or structural changes made by these implementations Equivalent transformations or substitutions all fall within the protection scope of the present invention.

[0030] Such as figure 1 As shown, this embodiment provides a hardware Trojan detection method based on side channel information, and the detection steps include: data collection-data preprocessing-data analysis-drawing a conclusion. Specifically include:

[0031] First build a chip electromagnetic leakage signal acquisition and detection platform, and then use Principal Component Analysis (PCA, Principal Component Analysis) method to reduce the dimension (data acquisition and preprocessing) of the collected electromagnetic signal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of chip security, and particularly relates to a hardware-Trojan-horse detection method based on side-channel analysis. The method includes: establishing a chip side-channel signal collection and detection platform; utilizing a principal component-based analysis method to carry out dimension reducing on collected side-channel data to reduce the amount of the dataand extract valid information; and selecting a detection algorithm to analyze the data to obtain a detection result. According to the method, the chip side-channel signal collection platform is built,the detection algorithm is selected to detect hardware Trojan horses, thus a user can realize hardware-Trojan-horse detection simply by inputting related parameters according to prompting, Trojan-horse detection can be realized simply without the need for manually importing the data or inputting code of the detection algorithm, detection efficiency and accuracy are improved, detection of multipledetection algorithms can be realized at the same time, and the algorithms can also be extended according to user needs.

Description

technical field [0001] The invention belongs to the field of chip-safe hardware Trojan horse detection, and in particular relates to a hardware Trojan horse detection method based on side channel analysis. Background technique [0002] With the rapid development of electronic technology, the scale of IC design is getting larger and larger, and the complexity is getting higher and higher. With the further refinement of the division of labor in semiconductor design and manufacturing, more and more IC companies rely on design companies and manufacturing plants to reduce product costs. At the same time, factors such as the reuse of third-party IP cores, design and test outsourcing, and the widespread use of EDA tools have brought security risks to IC design, resulting in the possibility of implanting hardware Trojans throughout the entire life cycle of IC design. [0003] The research on hardware Trojans is a part of chip security in system security. It started relatively late,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/76
CPCG06F21/566G06F21/76
Inventor 张磊董有恒王建新肖超恩高献伟赵成殷梦婕
Owner BEIJING ELECTRONICS SCI & TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products