Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and chip for detecting hardware Trojans in circuits

A hardware Trojan horse and circuit technology, applied in the field of integrated circuit trustworthiness detection, can solve the problems of reducing operability and practical applicability, destroying original circuit functions, etc.

Active Publication Date: 2020-09-04
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +3
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, logic AND gates or logic OR gates are implanted on such nodes to increase the switching probability of nodes. Although this reduces the risk of integrated circuits being attacked by hardware Trojan horses, it will destroy the original circuit functions and greatly reduce the operability and Practical applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and chip for detecting hardware Trojans in circuits
  • Method, system and chip for detecting hardware Trojans in circuits
  • Method, system and chip for detecting hardware Trojans in circuits

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0044] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0045] Hardware Trojans are malicious circuits implanted in integrated circuits by attackers to achieve certain attack purposes. In order to avoid hardware Trojans being detected by traditional functional testing and structural testing techniques, attackers generally choose relatively concealed activation conditions to achieve Low concealment of hardware Trojans. When the hardware Trojan is in a silent state, the hardware ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a system and a chip for detecting a hardware Trojan horse of a circuit. In the detection method, the low-activity nodes with internal logic relations are used as the implantation position of the self-detection unit on the chip, and the self-detection is performed on the implanted chip. unit; when the low-activity nodes with internal logical relationships reach a rare state, the on-chip self-detection unit monitors whether the internal logical relationships between the low-active nodes change online, and if the internal logical relationships are broken, it is considered that there is a hardware Trojan. The method, system and chip for detecting a hardware Trojan horse of a circuit can efficiently detect a hardware Trojan horse without resorting to external testing equipment and tools and without destroying original circuit functions.

Description

technical field [0001] The invention relates to the field of trustworthiness detection of integrated circuits, in particular to a method, system and chip for detecting hardware Trojans of circuits. Background technique [0002] The listing of integrated circuit chips needs to go through four stages: design, manufacture, packaging and testing. Due to the advancement and complexity of integrated circuit products, and in order to make more reasonable use of resources and capital allocation, the design and manufacturing process of a single-chip integrated circuit is completely completed by a number of units, and the separation of the integrated circuit design and manufacturing process, this It brings great security risks to the security of integrated circuits, for example, a large number of third-party IP cores are reused in the design stage, there are untrustworthy masks in the manufacturing process, and there may be redundant packaging in the packaging process. These security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 张海峰赵毅强刘燕江叶茂原义栋
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY