Hardware Trojan horse detection method and system based on improvement of activation probability
A hardware Trojan detection and probabilistic technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of leaking circuit confidential information, destroying the circuit, affecting the normal operation of the circuit, etc., and achieve the effect of improving detection accuracy and activation probability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.
[0023] figure 1 For a hardware Trojan detection method based on increasing activation probability provided by the embodiment of the present application, see figure 1 , the method includes:
[0024] S101. Determine a node position for inserting an alternative data selector MUX according to the flip probability of a circuit node in the original circuit and insert the MUX to obtain a reference circuit.
[0025] Specifically, the signal probability of each circuit node in the original circuit is determined, and the signal probability includes a high-level signal probability and a low-level signal probability. The flipping probability of the circuit node is determined according to the signal probability of the circuit node. For example, the signals of the two input internal nodes of a 2-input AND gate are known, and the probability of a high-level signal...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


