A hardware Trojan horse detection method based on scan chain feature analysis

A hardware Trojan detection and feature analysis technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as affecting the original signal, lack of stability, weak processing ability of process noise interference, achieve strong model expression ability, improve detection efficiency, improve Detect the effect of the effect

Active Publication Date: 2019-05-28
FUZHOU UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has high detection efficiency and low cost, but the detection accuracy and efficiency of the method depend on the selection of Trojan horse features and lack of stability; Channel information is used to find hardware Trojan horses. Unfortunately, it is difficult to obtain "standard" chip samples in reality, and the detection effect of the side channel is heavily dependent on the accuracy of the instrument, which is not suitable for VLSI
Moreover, the side channel method has a weak ability to deal with the interference of process noise, and the denoising processing of bypass noise may affect the original signal again

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware Trojan horse detection method based on scan chain feature analysis
  • A hardware Trojan horse detection method based on scan chain feature analysis
  • A hardware Trojan horse detection method based on scan chain feature analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0048]It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0049] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hardware Trojan horse detection method based on scan chain feature analysis. The method starts with a gate-level netlist of an integrated circuit. The invention provides thehardware Trojan horse detection method based on scan chain feature analysis in a chip design stage. A gate-level netlist of an integrated circuit is firstly converted into a scanning chain netlist, then two new Trojan characteristics are provided by combining the advantages of a traditional circuit characteristic analysis method, and a LightGBM algorithm is utilized to classify a Trojan wire network and a normal wire network. Meanwhile, a machine learning algorithm and a circuit feature analysis method are combined and applied to the hardware Trojan horse detection method, and the method hasthe advantages of being real-time, accurate, low in cost and the like. Aiming at the defects that a traditional hardware Trojan horse circuit feature analysis method is high in time complexity and lowin individual Trojan horse detection efficiency, the scanning chain netlist feature analysis method provided by the invention can improve the detection effect of hardware Trojan horses, and a machinelearning LightGBM algorithm can improve the detection efficiency of the method.

Description

technical field [0001] The invention relates to the field of integrated circuit Trojan horse detection, in particular to a hardware Trojan horse detection method based on scan chain feature analysis. Background technique [0002] With the development of wireless communication, sensor technology, embedded system and microelectronics technology, the safety of integrated circuits has been widely valued by the academic and industrial circles of various countries. [0003] At present, hardware Trojan detection technology can be roughly divided into two categories: formal verification and circuit characteristic analysis, both of which have advantages and disadvantages. [0004] Formal verification is an algorithm-based logic verification method that can exhaustively prove a series of predefined security attribute rules that IC designs should satisfy. For example, the untrusted circuit identification technology proposed by Hicks et al. identifies suspicious circuit nets by looking...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/55
Inventor 董晨贺国荣叶尹熊子奇
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products