Detecting method of combining infrared imagery and normal distribution analysis for hardware trojan horse

A hardware Trojan detection and infrared image technology, which is applied in image communication, radiation pyrometry, color TV parts, etc., can solve the problems of slow verification process, poor detection effect and high cost, and achieve low detection cost and high detection cost. high precision effect

Active Publication Date: 2018-07-06
NAT UNIV OF DEFENSE TECH
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of reverse anatomy verification are: 1. The process of chip reverse analysis is very complicated and the verification process is slow; 2. This is a destructive hardware Trojan detection method. After the detection is completed, the detected chip is completely scrapped and cannot be used anymore
[0006] To sum up, the above method either has the problem of high cost, or has the problem of poor detection effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting method of combining infrared imagery and normal distribution analysis for hardware trojan horse
  • Detecting method of combining infrared imagery and normal distribution analysis for hardware trojan horse
  • Detecting method of combining infrared imagery and normal distribution analysis for hardware trojan horse

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0057] A hardware Trojan consists of two parts - the trigger part and the load part. The trigger part will always be in the working state, because it needs to monitor the state of the circuit and activate the load part to work at a specific moment. The active part of the trigger consumes energy, which generates heat and radiates it into space. This heat can be captured by an infrared camera, which is the change in the heat bypass information caused by the hardware Trojan horse, and the present invention utilizes the heat bypass information for detection.

[0058] Such as figure 1 and figure 2 Shown, the hardware Trojan detection method that infrared image of the present invention combines with normal distribution analysis, its steps are:

[0059] S1: Capture an infrared image.

[0060] Let a pure chip sample without hardware Tro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a detecting method of combining infrared imagery and normal distribution analysis for a hardware trojan horse. The detecting method comprises the steps that S1: the infrared imagery is captured; a pure chip sample without the hardware trojan horse and a detected chip with a same model simultaneously starts to work, and the infrared imagery of the two chips over a period of time is captured by imagery collecting equipment; S2: a first difference is carried out on the acquired infrared imagery; in the period of sampling time, a pair of infrared imagery is generated at each sampling moment, the difference is carried out on the pair of infrared imagery, infrared imagery after the difference is obtained; S3: a second difference is carried out on the differential infrared imagery ateach moment. Each pixel point in the obtained differential infrared imagery in the first difference is extracted, and differential temperature is drew on a coordinate graph with taking time as an abscissa; S4: judgement is carried out, and the differential temperature of the pixel point with the trojan horse is higher; S5: the normal distribution analysis is carried out. The detecting method has the advantages of high detecting precision, low detecting cost, high detecting efficiency and the like.

Description

technical field [0001] The invention mainly relates to the field of hardware Trojan horse detection of integrated circuits, in particular to a hardware Trojan horse detection method combining infrared images and normal distribution analysis. Background technique [0002] As the cost of integrated circuit production lines is getting higher and higher, many integrated circuit designers choose to outsource the link of integrated circuit manufacturing to third-party foundries. This outsourcing leads to the credibility risk of the integrated circuit, and additional malicious circuits may be implanted in the original circuit, and this malicious circuit is called a hardware Trojan horse. Hardware Trojan detection has become an important topic in the field of chip security, and a variety of detection methods have been proposed, such as functional and structural testing, design for testability, reverse anatomy, and bypass signal detection. [0003] The reverse anatomy verification m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76H04N5/33G01J5/00
CPCG01J5/00G01J2005/0077G06F21/76H04N5/33
Inventor 陈吉华唐永康侯申何小威李少青乐大珩沈高张若男张启明隋强胡星杨彬彬赵晟聂星宇成钊
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products