Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying safety of circuit and computer readable storage medium

A verification method and security technology, applied in the field of circuit security verification methods and computer-readable storage media, can solve problems such as lack of security in circuits

Inactive Publication Date: 2018-08-03
58TH RES INST OF CETC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem in the prior art that the circuit lacks security due to the introduction of backdoor vulnerabilities during the design stage or when using third-party IP, the embodiment of the present invention provides a circuit security verification method and a computer-readable storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying safety of circuit and computer readable storage medium
  • Method for verifying safety of circuit and computer readable storage medium
  • Method for verifying safety of circuit and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0043] figure 1 It is a method flowchart of a circuit security verification method provided in Embodiment 1 of the present invention, as shown in figure 1 As shown, the circuit security verification method may include:

[0044] In step 101, the circuit code and the circuit security attribute are respectively transformed into a proving circuit and a first theorem to be proved according to a predetermined circuit model.

[0045] Step 102, prove the first theorem to be proved according to the proof circuit.

[0046] Step 103, when the first theorem to be proved is established, it is determined that the circuit satisfies the circuit safety property.

[0047] To sum up, the embodiment of the present invention provides a circuit security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying the safety of a circuit and a computer readable storage medium, and belongs to the technical field of integrated circuit safety analysis. The method includes the steps that a circuit code and a circuit safety attribute are converted into a proving circuit and a first theorem to be proved respectively according to a preset circuit model; according to the proving circuit, the first theorem to be proved is proved; when the first theorem to be proved is true, it is determined that the circuit meets the circuit safety attribute. The method solves the technical problem that at the design stage of the circuit or when a third party IP is used, the safety of the circuit is low because backdoor bugs are introduced, effectively verifies the safety attribute of the circuit, and realizes the breakthrough that theorem proving is utilized for verifying the code level safety of the circuit.

Description

technical field [0001] The invention relates to the technical field of integrated circuit security analysis, in particular to a circuit security verification method and a computer-readable storage medium. Background technique [0002] With the continuous development of integrated circuit technology, the integration of a single chip is getting higher and higher, making the scale of the chip larger and larger, and the complexity of chip design is greatly increased. In order to speed up the development progress and reduce costs, chip manufacturers use a large number of reusable IP soft cores in the design process. IP soft cores are reusable modules designed by third parties and are embedded in the design at the RTL level. The design complexity The improvement and the use of third-party IP cores will lead to potential security threats to integrated circuits. The security verification of chip design code and IP soft core is code-level analysis. Various functions are relatively f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50G06F21/57
CPCG06F21/577G06F30/367G06F30/398
Inventor 王丽娟张荣周昱
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products