Hardware Trojan horse detection method based on infrared image detail enhancement

A hardware Trojan detection, infrared image technology, applied in image enhancement, image analysis, image data processing and other directions, can solve problems such as unfavorable display hardware Trojan image processing, increase the difficulty of implementation, reduce useless noise, etc., and achieve efficient hardware Trojan detection. , Improve the detection accuracy, the design cost is reliable

Inactive Publication Date: 2018-12-11
NAT UNIV OF DEFENSE TECH
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. It is necessary to use a pure mother chip as a reference sample for comparison, which will increase the difficulty of implementation;
[0006] 2. Since the work of the hardware Trojan cannot be completely distinguished from the work of normal logic, detecting infrared signals in a strong infrared background has high requirements for the experimental environment and post-processing. For example, the hardware is detected in the infrared background where the chip works normally. The infrared signal of the Trojan horse, the post-processing of the infrared image detected under this background is relatively difficult, and the extraction of relatively small hardware Trojan infrared data in the thermal background of the chip’s normal operation is not conducive to the subsequent image processing of the hardware Trojan;
[0007] 3. Since it is necessary to use the Kalman filter to denoise the infrared image of the sample and the infrared image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on infrared image detail enhancement
  • Hardware Trojan horse detection method based on infrared image detail enhancement
  • Hardware Trojan horse detection method based on infrared image detail enhancement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0040] Such as figure 1 As shown, the steps of the hardware Trojan horse detection method based on infrared image detail enhancement in this embodiment include:

[0041] S1. Implanting a ring oscillator module in the logical spare area of ​​the target chip in advance, and distinguishing the ring vibration thermal mode of the ring oscillator module from the normal working mode of the chip by configuring the working mode;

[0042] S2. When detecting the target chip, obtain an infrared image of the chip in the ring vibration thermal mode;

[0043] S3. Perform noise reduction processing on the infrared image obtained in step S2 in the time dimension, and output the image after noise reduction processing;

[0044] S4. Using the image detail enhancement method to pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware Trojan horse detection method based on infrared image detail enhancement. The method comprises the following steps: S1, A ring oscillator module is implanted in a logic spare area of a target chip in advance, and the normal working mode of a ring vibration heat mode chip is distinguished by configuring the working mode; S2, when the target chip is detected, the infrared image of the chip in the ring vibration heat mode is obtained; S3, noise reduction processing is carried out on the obtained infrared image in the time dimension; S4, an image detail enhancement method is utilized to enhance the spatial dimension of the image after noise reduction processing; S5, the configuration information of the chip implanted ring oscillator module is acquired, and iscompared with the ring vibration thermal mode infrared image after detail enhancement, if the consistent or phase difference result is within the specified range, a condition that there is no hardware Trojan horse implantation can be judged. The method has the advantages of simple operation, low cost, high detection accuracy and efficiency.

Description

technical field [0001] The invention relates to the technical field of chip hardware Trojan horse detection, in particular to a hardware Trojan horse detection method based on infrared image detail enhancement. Background technique [0002] The hardware Trojan horse is the intentional tampering of the circuit. The design of the hardware Trojan horse exists in the entire IC design and manufacturing process. It mainly uses the internal redundant state of the circuit or the redundant area in the layout to tamper with the target circuit purposefully during the design process, thereby To achieve the purpose of tampering with circuit functions, leaking confidential information, or paralyzing the system unconditionally or under preset trigger conditions. In short, a hardware Trojan horse is a tiny logic added to a normal design to achieve malicious purposes. [0003] Aiming at the threat of hardware Trojans, two methods are usually used: trusted security design and hardware Trojan ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06T5/00
CPCG06F21/562G06T5/002G06T2207/10048
Inventor 李少青陈吉华唐永康石佳禾成钊胡星侯申赵晟沈高张若男王荣
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products