Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware Trojan horse detection method and system based on improvement of activation probability

A hardware Trojan detection and probabilistic technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of leaking circuit confidential information, destroying the circuit, affecting the normal operation of the circuit, etc., and achieve the effect of improving detection accuracy and activation probability

Inactive Publication Date: 2019-10-29
SOUTHWEST JIAOTONG UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A hardware Trojan horse is a special circuit embedded in an electronic circuit system with malicious purposes. It will be triggered under certain conditions (such as a specific time, a specific logic value or state, etc.) to complete the malicious execution of the original hardware design. The effect of tampering may cause the leakage of confidential information of the circuit, cause the internal function of the circuit to fail, affect the normal operation of the circuit, and even destroy the serious consequences of the entire circuit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method and system based on improvement of activation probability
  • Hardware Trojan horse detection method and system based on improvement of activation probability
  • Hardware Trojan horse detection method and system based on improvement of activation probability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.

[0023] figure 1 For a hardware Trojan detection method based on increasing activation probability provided by the embodiment of the present application, see figure 1 , the method includes:

[0024] S101. Determine a node position for inserting an alternative data selector MUX according to the flip probability of a circuit node in the original circuit and insert the MUX to obtain a reference circuit.

[0025] Specifically, the signal probability of each circuit node in the original circuit is determined, and the signal probability includes a high-level signal probability and a low-level signal probability. The flipping probability of the circuit node is determined according to the signal probability of the circuit node. For example, the signals of the two input internal nodes of a 2-input AND gate are known, and the probability of a high-level signal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan horse detection method and system based on improvement of activation probability, and the method comprises the steps: determining the position of a node inserted into an either-or data selector MUX according to the turnover probability of a circuit node in an original circuit, and inserting the node into the MUX, and obtaining a reference circuit; inserting a preset hardware Trojan horse circuit to obtain a circuit to be tested, and respectively obtaining dynamic current relation curves through simulation; performing Mahalanobis distance calculation onthe dynamic current relation curve, counting the distribution of the dynamic current relation curve, and judging whether Trojan horses exist in the to-be-tested circuit or not after comparison. The MUX is selectively inserted according to the overturning probability of the circuit nodes in the circuit. The overturning probability of the circuit nodes inserted into the MUX is improved, and the activation probability of the hardware Trojan horse is improved. When the hardware Trojan horse is inserted into the original circuit, the activation probability of the hardware Trojan horse can be improved, so that the dynamic current relation curve obtained by the circuit inserted into the hardware Trojan horse is obviously different from the dynamic current relation curve of the circuit inserted into the hardware Trojan horse, and the detection precision of the hardware Trojan horse is improved.

Description

technical field [0001] The present application relates to the technical field of hardware circuit Trojan horse detection, in particular to a hardware Trojan horse detection method and system based on increasing activation probability. Background technique [0002] In recent years, with the rapid development of integrated circuits (IC, Integrated Circuit), human society has entered an information age based on integrated circuits and microelectronics technology. The information industry with the integrated circuit as the core is widely used in both civil and military applications and occupies a very important position. Whether it is mobile phones, computers, televisions and other electronic products in daily life, or important large-scale equipment in aerospace, transportation, communications, nuclear facilities, medical and other industries, almost all of them are inseparable from the application of integrated circuit systems. The number of collective transistors that can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 吴新春龙思羽周彬白天蕊吴湛朱书霖
Owner SOUTHWEST JIAOTONG UNIV