Hardware Trojan horse detection method based on information flow security verification

A hardware Trojan detection and security verification technology, applied in the field of information security, can solve the problems of inability to accurately locate the Trojan design, high design cost, and reveal the trigger mechanism of the Trojan, so as to avoid design overhead, improve efficiency, and achieve precise positioning.

Active Publication Date: 2019-08-06
RES & DEV INST OF NORTHWESTERN POLYTECHNICAL UNIV IN SHENZHEN +1
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing security verification methods usually need to use a formal language to reconstruct the security verification model of the hardware design. There are significant semantic differences between the formal language and the hardware design language, which will increase a large amount of additional design costs.
Furthermore, existing methods often fail to pinpoint the Trojan design or reveal the Trojan trigger mechanism from the entire design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on information flow security verification
  • Hardware Trojan horse detection method based on information flow security verification
  • Hardware Trojan horse detection method based on information flow security verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0051] The invention proposes a Trojan horse detection method based on information flow security verification aiming at the potential hardware Trojan horse safety threat in integrated circuit hardware design whose design process is uncontrollable. The working principle of this method is: use the hardware information flow analysis method to construct the information flow model of the hardware design, describe the model by using the standard hardware design description language, and define the information flow security attributes that the hardware design needs to meet, such as confidentiality, integrity, etc. and isolation properties. Then, using the formal verification tools in the EDA tool chain, combined with the information flow model of the hardware design, the expected security properties are formally verified. When a violation of the security attr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware Trojan horse detection method based on information flow security verification. The method includes constructing an information flow model for integrated circuit hardware design; defining information flow security attributes required to be met by hardware design; adopting an EDA formal verification tool for information flow safety verification, detecting potentialTrojans in hardware design by capturing the situation that information flow safety attributes violate, and achieving accurate positioning of Trojan design and triggering mechanism revealing of the Trojan design by means of the reverse tracking capacity provided by the information flow model. The method can effectively avoid additional design expenditure caused by semantic difference between the hardware design language and the verification language, and improves the efficiency of security verification and Trojan horse detection.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a hardware Trojan horse detection method, which is a processing and analysis method for integrated circuit hardware design, using information flow security verification technology to analyze hardware design, and through information flow security verification means, to determine the integrated Whether there is a Trojan horse in the circuit hardware design. Background technique [0002] IC hardware design and supply has become a global industrial chain. The integrated circuit design process often involves multiple teams distributed around the world, and usually integrates a large number of IP (Intellectual Property) core products from untrusted third parties. The uncontrollability of the design process will lead to potential hardware Trojan horses and backdoors in the hardware design. and other security vulnerabilities. Hardware Trojan horses are security threats cause...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76G06F21/55
CPCG06F21/76G06F21/55
Inventor 胡伟邰瑜慕德俊
Owner RES & DEV INST OF NORTHWESTERN POLYTECHNICAL UNIV IN SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products