Hardware Trojan horse side channel analysis method based on multi-IP core

A side-channel analysis and hardware Trojan horse technology, applied in the field of third-party IP core trustworthiness verification, can solve the problems that simulation verification is difficult to achieve function/code coverage, model verification and formal verification are helpless, and small-scale circuits are limited , to achieve the effect of easy operation, speed up the process of practical application, and reduce cost and efficiency

Active Publication Date: 2018-12-18
TIANJIN UNIV
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Formal verification can find design errors or malicious circuits that cannot be found by simulation verification, but it is mainly for functional hardware Trojan horses
If the hardware Trojan horse or malicious backdoor does not change the function of the original IP core, neither model verifi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse side channel analysis method based on multi-IP core

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] Aiming at the problems that the coverage rate of simulation verification is difficult to reach 100% and the formal verification can only be limited to small-scale circuits, the invention proposes a method for detecting hardware Trojans by using the idea of ​​side channel analysis, and determines the method according to the side channel analysis technology. The mutual deduction relationship between multiple IP cores, when the side channel information of one of the IP cores is different from the ideal side channel information, it is determined that there is a hardware Trojan. This method is not limited by the type of hardware Trojan and circuit scale, and the deduction relationship between multiple IP cores is constructed in a distributed manner to assist each other in detection, which greatly improves the detection efficiency of hardware Trojans. In addition, the existing detection technology can be migrated to further Improve its detection efficiency, and distributed det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of third-party IP core trusted willfulness verification, in order to propose a new hardware Trojan horse method, improve the detection efficiency of the hardware Trojan horse, and effectively solve the limitation problem of the reference model in the actual test process by distributed detection, thereby further promoting the practical process of IP core securityvulnerability detection. Therefore, the technical proposal adopted by the invention is that the hardware Trojan horse side channel analysis method based on the multi-IP core determines the mutual deduction relationship among the multi-IP cores according to the side channel analysis technology, and when the side channel information of one of the IP cores is different from the ideal side channel information, the hardware Trojan horse is determined to exist. The invention is mainly applied to IP core trusted willfulness occasions.

Description

technical field [0001] The invention belongs to the field of third-party IP core trustworthiness verification, and specifically relates to a hardware Trojan horse side channel analysis technology based on multiple IP cores. Background technique [0002] In the wave of informatization sweeping the world, information technology, as a powerful factor to promote social development, is widely used in many important fields such as military, finance, industry, commerce and personal life, and much of the information is directly related to government macro-control decisions, business Economic information, bank securities funds, energy resource data, major scientific research projects and other fields directly related to the destiny and interests of the country have become important driving forces for world economic growth. As the foundation of modern information systems, integrated circuit chips are widely used in all aspects of economic society and become a strategic, basic and lead...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/76
CPCG06F21/556G06F21/76
Inventor 赵毅强刘燕江马浩诚宋凯悦
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products