Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan detection method based on local area circuit mutual reference

A hardware Trojan detection and hardware Trojan technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of difficult to effectively predict the differences of integrated circuits, effective data matching, and multiplexing, so as to reduce test costs and test efficiency, and realize positioning , The effect of accelerating the practical process

Active Publication Date: 2018-11-30
TIANJIN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the design and manufacturing process of integrated circuits are gradually separated, and a large number of third-party IP cores are reused in the design process. In addition, the manufacturing process is often completed by the cooperation of third-party manufacturers. The design and manufacturing process is not completely reliable, so its Design data and layout data are not completely reliable
However, reverse analysis can verify and even obtain the golden model of the integrated circuit, but it is necessary to remove the chip package and grind the metal layer of the chip to reconstruct the original layout of the circuit, and the test cost is too expensive
In addition, even if the golden model of reverse analysis is obtained, there are random factors in the manufacturing process of integrated circuits, that is, there are process deviations between integrated circuits, and this deviation is random, and the differences between integrated circuits are difficult to effectively predict, so The golden model constructed from design data or layout data cannot effectively match the actual data
With the continuous advancement of hardware Trojan design technology, its side channel effects are getting weaker and weaker. Its side channel effects are easily overwhelmed by process deviations. Even with an effective golden model, it is difficult to identify small-area hardware Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan detection method based on local area circuit mutual reference
  • Hardware Trojan detection method based on local area circuit mutual reference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In view of the difficulty in obtaining reference models in side-channel analysis and the fact that process deviations seriously affect the recognition efficiency of side-channel analysis, the nonlinear regression method is used to determine the relationship between circuits in local areas, and this relationship is used as a cross-reference model. If there is a hardware Trojan , when the hardware Trojan is activated, it will change the relationship matrix of the local circuit. The relationship matrix between local circuits will change with each other, adaptively solve the process deviation problem between integrated circuits, greatly improve the accuracy of side channel analysis, and use the relationship between local circuits as a reference model , without reverse analysis to obtain the original design data of the circuit to construct a golden reference model that is in good agreement with the actual situation, which solves the mainstream problem of hardware Trojan detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of integrated circuit trustworthiness and further promotes the practical process of hardware Trojan for improving the precision of side channel analysis. The invention relates to a hardware Trojan detection method based on local area circuit mutual reference. The method comprises the following steps that (1) a circuit area is divided; (2) a side channel test platform is established; (3) the side channel information of M sub-regions is tested under the excitation of the same test vector set; (4) regional circuit relationship is determined; (5) hardware Trojanis verified; (6) loop iteration is verified. The method is mainly applied in the field of integrated circuit trustworthiness detection.

Description

technical field [0001] The invention belongs to the field of trustworthiness of integrated circuits, and in particular relates to a hardware Trojan horse detection method based on local area circuit cross-reference. Background technique [0002] With the continuous advancement of integrated circuit manufacturing technology and computer-aided design technology, integrated circuits have gradually become a powerful driving force to promote the progress of the information society. Strategic, basic and leading industries for social development. Due to the advanced nature and complexity of integrated circuits, the complete supply chain of integrated circuits spreads all over the world, and its design and manufacturing process requires the participation of units from different countries and regions, including some attackers or competitors with ulterior motives. Once these security risks penetrate, they can implant hardware Trojan horses in the design and manufacturing process to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 赵毅强刘燕江马浩诚宋凯悦
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products