Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A hardware Trojan detection method based on scan chain feature analysis

A hardware Trojan detection and feature analysis technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of lack of stability, detection accuracy and efficiency depending on the selection of Trojan features, affecting the original signal, etc., to reduce time and cost overhead , improve the efficiency of Trojan horse detection, and the effect of strong model expression ability

Active Publication Date: 2022-07-08
FUZHOU UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has high detection efficiency and low cost, but the detection accuracy and efficiency of the method depend on the selection of Trojan horse features and lack of stability; Channel information is used to find hardware Trojan horses. Unfortunately, it is difficult to obtain "standard" chip samples in reality, and the detection effect of the side channel is heavily dependent on the accuracy of the instrument, which is not suitable for VLSI
Moreover, the side channel method has a weak ability to deal with the interference of process noise, and the denoising processing of bypass noise may affect the original signal again

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware Trojan detection method based on scan chain feature analysis
  • A hardware Trojan detection method based on scan chain feature analysis
  • A hardware Trojan detection method based on scan chain feature analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0048]It should be noted that the following detailed description is exemplary and intended to provide further explanation of the application. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0049] It should be noted that the terminology used herein is for the purpose of describing specific embodiments only, and is not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and / or "including" are used in this specification, it indicates that There are features, steps, operations, devices, components and / o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hardware Trojan detection method based on scan chain feature analysis. Starting from the gate-level netlist of an integrated circuit, a hardware Trojan detection method based on scan chain feature analysis is proposed in the chip design stage. The level netlist is first converted into a scan chain netlist, and then combined with the advantages of traditional circuit feature analysis methods, two new Trojan features are proposed, and the LightGBM algorithm is used to classify Trojan nets and normal nets. At the same time, the present invention combines the machine learning algorithm with the circuit feature analysis method and applies it in the hardware Trojan horse detection method, and has the characteristics of real-time, accurate, low-cost and the like. Aiming at the defects of high time complexity and low detection efficiency of individual Trojans in the traditional hardware Trojan circuit feature analysis method, the scanning chain netlist feature analysis method proposed by the present invention can improve the detection effect of hardware Trojans, and the machine learning LightGBM algorithm can improve the method detection efficiency.

Description

technical field [0001] The invention relates to the field of integrated circuit Trojan horse detection, in particular to a hardware Trojan horse detection method based on scan chain feature analysis. Background technique [0002] With the development of wireless communication, sensor technology, embedded system and microelectronics technology, the security of integrated circuits has received extensive attention from academia and industry in various countries. [0003] At present, hardware Trojan detection technologies can be roughly divided into two categories: formal verification and circuit feature analysis. Both methods have their own advantages and disadvantages. [0004] Formal verification is an algorithm-based logic verification method that can exhaustively prove a series of predefined security property rules that an IC design should satisfy. For example, the untrusted circuit identification technique proposed by Hicks et al. identifies suspicious circuit nets by loo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/55
Inventor 董晨贺国荣叶尹熊子奇
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products