Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic Generation of Security Assertions for Detecting Hardware Trojans

A hardware Trojan and automatic generation technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of low efficiency, time-consuming, and error-prone hardware Trojans, and achieve the effects of less error, improved accuracy, and time-saving errors

Active Publication Date: 2021-10-08
TSINGHUA UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: in the prior art, the assertions required for formal verification need to be manually written, which is very time-consuming and error-prone, resulting in low efficiency of formal verification for detecting hardware Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic Generation of Security Assertions for Detecting Hardware Trojans
  • Automatic Generation of Security Assertions for Detecting Hardware Trojans
  • Automatic Generation of Security Assertions for Detecting Hardware Trojans

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0089] In order to solve the problem that the assertions required for formal verification in the prior art need to be manually written, which is very time-consuming and error-prone, resulting in the low efficiency of formal verification for detecting hardware Trojans, an embodiment of the present invention provides a method for detecting hardware Trojans Security assertion auto-generation method.

[0090] In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for automatically generating a security assertion for detecting a hardware Trojan, including: simulating a register transfer level netlist file of a chip to be tested to obtain a simulation running result and a simulation running file; The running results are analyzed to obtain the signal of the suspected hardware Trojan circuit; the following steps are performed for each signal of the suspected hardware Trojan circuit: according to the simulation running file, the register transfer level invariant corresponding to the signal of the suspected hardware Trojan circuit is deduced; according to the construction The knowledge base of security assertion templates, the deduced register transfer level invariants, and the signals of suspected hardware trojan circuits, generate security assertions corresponding to the signals of suspected hardware trojan circuits. The invention utilizes the register transmission level invariant to realize the automatic generation of the security assertion, reduces the workload of designers, saves time and is less prone to errors, and effectively improves the efficiency of formal verification and detection of hardware Trojan horses.

Description

technical field [0001] The invention relates to the technical field of safety verification of integrated circuits, in particular to a method for automatically generating safety assertions for detecting hardware Trojan horses. Background technique [0002] Hardware Trojans refer to special modules and circuits that are intentionally implanted into electronic systems, or defective modules and circuits left unintentionally by designers. This kind of module or circuit is usually hidden in the original circuit. Under special conditions, the module or circuit can be used by attackers to modify the original circuit purposefully, and then achieve destructive functions, causing the original circuit to Things that should not have happened, such as leaking information to an attacker, changing the function of the circuit, or even directly damaging the circuit. [0003] In recent years, due to the rapid development of integrated circuit technology, the chip design process has become inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71
CPCG06F21/71
Inventor 蔡懿慈王晨光周强
Owner TSINGHUA UNIV