Hardware Trojan detection method based on local area circuit mutual reference

A hardware Trojan detection and hardware Trojan technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of difficult to effectively predict the differences of integrated circuits, effective data matching, and multiplexing, so as to reduce test costs and test efficiency, and realize positioning , The effect of accelerating the practical process

Active Publication Date: 2018-11-30
TIANJIN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the design and manufacturing process of integrated circuits are gradually separated, and a large number of third-party IP cores are reused in the design process. In addition, the manufacturing process is often completed by the cooperation of third-party manufacturers. The design and manufacturing process is not completely reliable, so its Design data and layout data are not completely reliable
However, reverse analysis can verify and even obtain the golden model of the integrated circuit, but it is necessary to remove the chip package and grind the metal layer of the chip to reconstruct the original layout of the circuit, and the test cost is too expensive
In addition, even if the g

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan detection method based on local area circuit mutual reference
  • Hardware Trojan detection method based on local area circuit mutual reference

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] In view of the difficulty in obtaining the reference model in the side channel analysis and the problem that the process deviation seriously affects the recognition efficiency of the side channel analysis, the nonlinear regression method is used to determine the relationship between the circuits in the local area, and the relationship is used as a cross-reference model. If there is a hardware Trojan horse , When the hardware Trojan is activated, it will change the relationship matrix of the local circuit. The relationship matrix between local circuits will change with the circuit, adaptively solve the problem of process deviation between integrated circuits, greatly improve the accuracy of side channel analysis, and use the relationship between local circuits as a reference model , No need to reverse analysis to obtain the original design data of the circuit and then construct a golden reference model that is in good agreement with the actual situation. This solves the ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of integrated circuit trustworthiness and further promotes the practical process of hardware Trojan for improving the precision of side channel analysis. The invention relates to a hardware Trojan detection method based on local area circuit mutual reference. The method comprises the following steps that (1) a circuit area is divided; (2) a side channel test platform is established; (3) the side channel information of M sub-regions is tested under the excitation of the same test vector set; (4) regional circuit relationship is determined; (5) hardware Trojanis verified; (6) loop iteration is verified. The method is mainly applied in the field of integrated circuit trustworthiness detection.

Description

technical field [0001] The invention belongs to the field of trustworthiness of integrated circuits, and in particular relates to a hardware Trojan horse detection method based on local area circuit cross-reference. Background technique [0002] With the continuous advancement of integrated circuit manufacturing technology and computer-aided design technology, integrated circuits have gradually become a powerful driving force to promote the progress of the information society. Strategic, basic and leading industries for social development. Due to the advanced nature and complexity of integrated circuits, the complete supply chain of integrated circuits spreads all over the world, and its design and manufacturing process requires the participation of units from different countries and regions, including some attackers or competitors with ulterior motives. Once these security risks penetrate, they can implant hardware Trojan horses in the design and manufacturing process to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 赵毅强刘燕江马浩诚宋凯悦
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products