Unlock instant, AI-driven research and patent intelligence for your innovation.

Trojan horse circuit detection and error recovery method during equipment operation

A circuit detection and recovery method technology, applied in the computer field, can solve the problems of not having universally applicable characteristics, unable to meet runtime requirements, IP cores unable to locate and replace in time, etc., to achieve the effect of minimizing cost and overhead

Active Publication Date: 2020-01-07
CHONGQING UNIV OF POSTS & TELECOMM
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To sum up, the existing four Trojan horse circuit detection mechanisms are not universally applicable, and do not provide error recovery calculations, and cannot meet the runtime requirements
[0004] At the same time, the infected IP core cannot be located and replaced in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trojan horse circuit detection and error recovery method during equipment operation
  • Trojan horse circuit detection and error recovery method during equipment operation
  • Trojan horse circuit detection and error recovery method during equipment operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0066] The invention provides a Trojan horse circuit detection and error recovery method during device operation in an integrated circuit, which includes the following steps:

[0067] S1, establishing the original calculation and recalculation for Trojan horse circuit detection, and the recovery calculation for Trojan horse circuit being triggered and making an error.

[0068] S2, bind the task node to the IP core.

[0069] Such as figure 1 and figure 2 As shown in , it is a schematic diagram of the original calculation, recalculatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Trojan horse circuit detection and error recovery method during equipment operation, which comprises the following steps of: establishing original calculation and re-calculation for Trojan horse circuit detection, and recovery calculation when a Trojan horse circuit is triggered and has an error; binding the task node to an IP core; calculating the number of IP core manufacturers required by the IP core; matching the optimal IP core manufacturer combination; determining the scheduling time of the tasks and the number of IP cores; constructing a positioning and replacing structure for each IP core; detecting whether the original calculation result and the recalculation result are the same or not in real time, and if not, positioning the IP core where the activated Trojan horse circuit is located; and replacing the IP core where the activated Trojan circuit is located. By means of the method, it can be guaranteed that after the Trojan horse circuit is triggered,output errors are detected, and recovery calculation is provided, so that normal operation of the system is achieved, and meanwhile the infected IP core can be rapidly positioned and replaced before next operation of the system.

Description

technical field [0001] The invention relates to the field of computers, in particular to a Trojan horse circuit detection and error recovery method when a device in an integrated circuit is running, and in particular to a Trojan horse circuit detection and error recovery method when an untrustworthy third-party IP core is running. Background technique [0002] The globalization of integrated circuit design and manufacturing has made chip security and reliability an important issue, and the detection of Trojan horse circuits in integrated circuit design has always been the top priority. [0003] There are four main detection methods for general Trojan horse circuits, which are physical detection, bypass analysis, functional testing, and trusted design. They are all non-runtime detection methods and do not provide recovery calculations. We analyze four Trojan horse circuit detection methods respectively. (1) Physical detection, which is essentially a technology based on fail...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 崔晓通王若晗罗心烺
Owner CHONGQING UNIV OF POSTS & TELECOMM