Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan horse side channel analysis method based on multi-IP core

A side-channel analysis and hardware Trojan horse technology, applied in the field of third-party IP core trustworthiness verification, can solve the problems that simulation verification is difficult to achieve function/code coverage, model verification and formal verification are helpless, and small-scale circuits are limited , to achieve the effect of easy operation, speed up the process of practical application, and reduce cost and efficiency

Active Publication Date: 2018-12-18
TIANJIN UNIV
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Formal verification can find design errors or malicious circuits that cannot be found by simulation verification, but it is mainly for functional hardware Trojan horses
If the hardware Trojan horse or malicious backdoor does not change the function of the original IP core, neither model verification nor formal verification can do anything
In addition, as the scale of the circuit becomes larger and larger, it is difficult for the simulation verification to achieve 100% function / code coverage, while the formal verification can only be limited to the verification level of small-scale circuits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse side channel analysis method based on multi-IP core

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Aiming at the problem that the coverage rate of simulation verification is difficult to reach 100% and formal verification can only be limited to small-scale circuits, the present invention proposes a method for detecting hardware Trojans using the idea of ​​side channel analysis, and determines the method based on side channel analysis technology The mutual deduction relationship between multiple IP cores, when the side channel information of one of the IP cores is different from the ideal side channel information, it is determined that there is a hardware Trojan horse. This method is not limited by the type of hardware Trojan and the scale of the circuit. It distributes the deduction relationship between multiple IP cores and assists each other in detection, which greatly improves the detection efficiency of hardware Trojan. In addition, the existing detection technology can be transferred to further Improve its detection efficiency, and distributed detection can effec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of third-party IP core trusted willfulness verification, in order to propose a new hardware Trojan horse method, improve the detection efficiency of the hardware Trojan horse, and effectively solve the limitation problem of the reference model in the actual test process by distributed detection, thereby further promoting the practical process of IP core securityvulnerability detection. Therefore, the technical proposal adopted by the invention is that the hardware Trojan horse side channel analysis method based on the multi-IP core determines the mutual deduction relationship among the multi-IP cores according to the side channel analysis technology, and when the side channel information of one of the IP cores is different from the ideal side channel information, the hardware Trojan horse is determined to exist. The invention is mainly applied to IP core trusted willfulness occasions.

Description

technical field [0001] The invention belongs to the field of third-party IP core trustworthiness verification, and specifically relates to a hardware Trojan horse side channel analysis technology based on multiple IP cores. Background technique [0002] In the wave of informatization sweeping the world, information technology, as a powerful factor to promote social development, is widely used in many important fields such as military, finance, industry, commerce and personal life, and much of the information is directly related to government macro-control decisions, business Economic information, bank securities funds, energy resource data, major scientific research projects and other fields directly related to the destiny and interests of the country have become important driving forces for world economic growth. As the foundation of modern information systems, integrated circuit chips are widely used in all aspects of economic society and become a strategic, basic and lead...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/76
CPCG06F21/556G06F21/76
Inventor 赵毅强刘燕江马浩诚宋凯悦
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products