Hardware Trojan horse detection device and method based on weak same paths

A hardware Trojan detection, same-path technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve problems such as increased power consumption, many circuit paths, and complex processes, saving circuit area and reducing complexity the effect of improving the accuracy

Active Publication Date: 2019-12-20
TIANJIN UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the many circuit paths in the chip, implanting shadow registers or time-to-digital converters will significantly increase the chip area and power consumption
In addition, the side channel analysis technology needs to measure the delay information of the original circuit as a golden model. The process of establishing the golden model is very complicated, which increases the detection cost of hardware Trojan horses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection device and method based on weak same paths
  • Hardware Trojan horse detection device and method based on weak same paths
  • Hardware Trojan horse detection device and method based on weak same paths

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The traditional path-based hardware Trojan detection method needs to measure and compare the delay information of a large number of original circuits, the detection efficiency is low, the cost is high, and there are process deviations in the manufacturing process, resulting in a deviation between the actual value of the path delay and the theoretical value, which seriously reduces the improved the accuracy of Trojan horse detection. Aiming at the problem that Trojan horses are easily implanted in the chip manufacturing process, the present invention proposes a multi-loop on-chip delay Trojan horse self-detection structure based on weakly identical paths, which can quickly and effectively detect delay information on weakly identical paths. And compared with the simulation results, there is no need to establish a golden model, which reduces the complexity and cost of chip inspection. By comparing the difference in path delay, the influence of process deviation is removed. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of integrated circuit hardware Trojan horse detection methods. Time delay information on a weak same path can be rapidly and effectively detected so that complexityand the cost of chip detection are reduced and the influence of process deviation is eliminated. The invention discloses a hardware Trojan horse detection device and method based on weak same paths. The method comprises the following steps: 1) performing static timing analysis on an integrated circuit layout; 2) setting a weak same path delay threshold, and analyzing and determining a weak same path set R; 3) analyzing the sensitivity of the weak same path, and screening the weak same path set; 4) implanting a multi-loop on-chip delay Trojan horse self-detection structure, and analyzing the effectiveness; 5) testing the delay information of the path after chip manufacturing; and 6) comparing the difference values of the delay information, and judging the path suspected to be implanted intothe Trojan. The method is mainly applied to integrated circuit design and manufacturing occasions.

Description

technical field [0001] The invention belongs to the field of integrated circuit hardware Trojan horse detection methods, in particular to a hardware Trojan horse detection method based on weak identical paths. Background technique [0002] Integrated circuits (Integrated Circuits, IC), as the core of various electronic products in life, have been widely used in mobile communications, satellite communications, aerospace and other aspects. Producing a qualified chip generally requires four links: integrated circuit design, manufacturing, testing and packaging. Because the cost of completing each link is very expensive, and the technical system is very large and complex, each link is separated and carried out independently of each other. Therefore, the chips used by users are more likely to be implanted with Trojan horses by hardware hackers during the manufacturing process, which will lead to chip security issues. These security problems are mainly manifested as increasing c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/76
CPCG06F21/556G06F21/76
Inventor 李宗哲赵毅强秦国轩刘燕江何家骥
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products