A method for side channel analysis of hardware Trojan horses based on multiple ip cores

A side-channel analysis and hardware Trojan horse technology, applied in the field of third-party IP core trustworthiness verification, can solve the problems of model verification and formal verification incapable of doing, simulation verification difficult to achieve function/code coverage, limited small-scale circuits, etc. , to achieve the effect of easy operation, speeding up the practical process, reducing cost and efficiency

Active Publication Date: 2022-01-11
TIANJIN UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Formal verification can find design errors or malicious circuits that cannot be found by simulation verification, but it is mainly for functional hardware Trojan horses
If the hardware Trojan horse or malicious backdoor does not change the function of the original IP core, neither model verification nor formal verification can do anything
In addition, as the scale of the circuit becomes larger and larger, it is difficult for the simulation verification to achieve 100% function / code coverage, while the formal verification can only be limited to the verification level of small-scale circuits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for side channel analysis of hardware Trojan horses based on multiple ip cores

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Aiming at the problem that the coverage rate of simulation verification is difficult to reach 100% and formal verification can only be limited to small-scale circuits, the present invention proposes a method for detecting hardware Trojans using the idea of ​​side channel analysis, and determines the method based on side channel analysis technology The mutual deduction relationship between multiple IP cores, when the side channel information of one of the IP cores is different from the ideal side channel information, it is determined that there is a hardware Trojan horse. This method is not limited by the type of hardware Trojan and the scale of the circuit. It distributes the deduction relationship between multiple IP cores and assists each other in detection, which greatly improves the detection efficiency of hardware Trojan. In addition, the existing detection technology can be transferred to further Improve its detection efficiency, and distributed detection can effec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of third-party IP core trustworthiness verification. In order to propose a new method for hardware Trojans, improve the detection efficiency of hardware Trojans, realize distributed detection and effectively solve the limitation problem of reference models in the actual testing process, and further promote IP Practical progress of nuclear security vulnerability detection. For this reason, the technical solution that the present invention adopts is, based on the hardware Trojan side channel analysis method of multiple IP cores, determine the mutual derivation relationship between multiple IP cores according to the side channel analysis technology, when the side channel information of one of the IP cores is consistent with the ideal If there is a discrepancy in the side channel information, it is determined that there is a hardware Trojan horse. The invention is mainly applied to the occasion of IP core trustworthiness.

Description

technical field [0001] The invention belongs to the field of third-party IP core trustworthiness verification, and specifically relates to a hardware Trojan horse side channel analysis technology based on multiple IP cores. Background technique [0002] In the wave of informatization sweeping the world, information technology, as a powerful factor to promote social development, is widely used in many important fields such as military, finance, industry, commerce and personal life, and much of the information is directly related to government macro-control decisions, business Economic information, bank securities funds, energy resource data, major scientific research projects and other fields directly related to the destiny and interests of the country have become important driving forces for world economic growth. As the foundation of modern information systems, integrated circuit chips are widely used in all aspects of economic society and become a strategic, basic and lead...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/76
CPCG06F21/556G06F21/76
Inventor 赵毅强刘燕江马浩诚宋凯悦
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products