Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A hardware Trojan real-time detection system and its design method

A technology for real-time detection of hardware Trojan horses, applied in computing, computer components, instruments, etc., can solve problems such as difficult detection of Trojan horses, achieve the effect of improving data transmission rate and efficiency, and improving hardware resource utilization

Active Publication Date: 2021-11-02
BEIHANG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the problems existing in the current IP core detection technology, and proposes a hardware Trojan horse real-time detection system and its design method to solve the problem that some Trojan horses are difficult to detect in the traditional hardware Trojan horse detection method. Real-time detection of the working status of the IP core inside the chip during the running phase can overcome the above two shortcomings of the traditional hardware Trojan detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware Trojan real-time detection system and its design method
  • A hardware Trojan real-time detection system and its design method
  • A hardware Trojan real-time detection system and its design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, for those skilled in the art, other legends can be obtained according to these drawings without creative effort.

[0026] Such as figure 1 As shown, the hardware Trojan real-time detection system provided by the present invention mainly includes three parts: a Trojan probe, a data transmission controller and a security monitoring kernel. The security monitoring kernel is also referred to as the security kernel in the accompanying drawings and the following description.

[0027] In the design stage of the integrated circuit chip, a certain number of Trojan horse probes are arranged on the layout of the integrated circuit chip to ensure that the power constraint lines in each area of ​​the chip can be covered. The Trojan horse probes implanted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware Trojan real-time detection system and a design method thereof. The system includes a Trojan horse probe, a data transmission controller and a safety monitoring kernel. The Trojan horse probe acquires a voltage bypass signal on the internal power constraint line of the integrated circuit chip, and transmits it to the safety monitoring kernel through the data transmission controller for Trojan detection. The method includes implanting Trojan horse probes on the integrated circuit chip and establishing a data transmission controller at the initial stage of design; optimizing the number of Trojan horse probes by using principal component analysis to obtain the optimized coordinates of the Trojan horse probes; optimizing the coordinates of the Trojan horse probes under construction Design and integrate third-party IP cores on the integrated circuit chip layout; establish a security monitoring core, monitor the working status of the IP cores inside the chip in real time, use the support vector machine classification algorithm to identify abnormal behaviors, and detect IP cores containing Trojan horses. The invention can detect and locate the IP core containing the Trojan horse in real time, and can find the behavior of the Trojan horse under the condition of low probability triggering.

Description

technical field [0001] The invention belongs to the field of integrated circuit and chip safety research and design, in particular to a hardware Trojan real-time monitoring system and a design method thereof. Background technique [0002] In the VLSI design process, in order to reduce design complexity, improve design reusability and shorten the design cycle, each functional module usually directly selects the existing IP core (Intellectual Property core, also known as intellectual property module) ) for integration. IP cores are divided into soft core IP, hard core IP, and solid core IP. In reality, most IP cores are submitted to integrated circuit designers in the form of non-open source hard cores and solid cores. A large number of these IP cores are used in the design of logical computing devices such as processors, microcontrollers, and storage devices. A typical system-on-chip usually needs to use dozens to hundreds of independent IP cores, and 70% of the IP cores are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/56G06F18/2135G06F18/2411
Inventor 夏同生潘权威
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products