Hardware Trojan real-time detection system and design method thereof

A technology for real-time detection of hardware Trojan horses, applied in computing, computer components, instruments, etc., can solve problems such as difficult detection of Trojan horses, achieve the effect of improving data transmission rate and efficiency, and improving hardware resource utilization

Active Publication Date: 2018-11-20
BEIHANG UNIV
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the problems existing in the current IP core detection technology, and proposes a hardware Trojan horse real-time detection system and its design method to solve the problem that some Trojan horses are difficult to...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan real-time detection system and design method thereof
  • Hardware Trojan real-time detection system and design method thereof
  • Hardware Trojan real-time detection system and design method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, for those skilled in the art, other legends can be obtained according to these drawings without creative effort.

[0026] Such as figure 1 As shown, the hardware Trojan real-time detection system provided by the present invention mainly includes three parts: a Trojan probe, a data transmission controller and a security monitoring kernel. The security monitoring kernel is also referred to as the security kernel in the accompanying drawings and the following description.

[0027] In the design stage of the integrated circuit chip, a certain number of Trojan horse probes are arranged on the layout of the integrated circuit chip to ensure that the power constraint lines in each area of ​​the chip can be covered. The Trojan horse probes implanted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware Trojan horse real-time detection system and a design method thereof. The system comprises Trojan probes, a data transmission controller and a safety monitoring kernel. The Trojan probes acquire voltage bypass signals on power supply constraint lines inside an integrated circuit chip, and transmit the voltage bypass signals to the safety monitoring kernel for Trojan detection through the data transmission controller. The method comprises the following steps: the Trojan probes are implanted on the integrated circuit chip at the initial design stage to establishthe data transmission controller; a principal component analysis method is used to optimize the number of the Trojan probes and the optimal coordinates of the Trojan probes are obtained; a third-partyIP core is designed and integrated on the integrated circuit chip layout with the Trojan probe optimal coordinates; a security monitoring kernel is established to monitor the working state of IP corein real time; the abnormal behavior is identified by a support vector machine classification algorithm and the IP core with the Trojan is detected. The invention can detect and locate the IP core containing the Trojan in real time, and can find the Trojan behavior triggered under the low probability condition.

Description

technical field [0001] The invention belongs to the field of integrated circuit and chip safety research and design, in particular to a hardware Trojan real-time monitoring system and a design method thereof. Background technique [0002] In the VLSI design process, in order to reduce design complexity, improve design reusability and shorten the design cycle, each functional module usually directly selects the existing IP core (Intellectual Property core, also known as intellectual property module) ) for integration. IP cores are divided into soft core IP, hard core IP, and solid core IP. In reality, most IP cores are submitted to integrated circuit designers in the form of non-open source hard cores and solid cores. A large number of these IP cores are used in the design of logical computing devices such as processors, microcontrollers, and storage devices. A typical system-on-chip usually needs to use dozens to hundreds of independent IP cores, and 70% of the IP cores are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/56G06F18/2135G06F18/2411
Inventor 夏同生潘权威
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products