Unlock instant, AI-driven research and patent intelligence for your innovation.

A Trojan horse circuit detection and error recovery method when equipment is running

A circuit detection and recovery method technology, applied in the computer field, can solve the problems of not having the characteristics of universal application, not providing error recovery calculation, IP core unable to locate and replace in time, etc., to achieve the effect of minimizing cost and overhead.

Active Publication Date: 2021-11-05
CHONGQING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To sum up, the existing four Trojan horse circuit detection mechanisms are not universally applicable, and do not provide error recovery calculations, and cannot meet the runtime requirements
[0004] At the same time, the infected IP core cannot be located and replaced in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trojan horse circuit detection and error recovery method when equipment is running
  • A Trojan horse circuit detection and error recovery method when equipment is running
  • A Trojan horse circuit detection and error recovery method when equipment is running

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0066] The invention provides a Trojan horse circuit detection and error recovery method during device operation in an integrated circuit, which includes the following steps:

[0067] S1, establishing the original calculation and recalculation for Trojan horse circuit detection, and the recovery calculation for Trojan horse circuit being triggered and making an error.

[0068] S2, bind the task node to the IP core.

[0069] Such as figure 1 and figure 2 As shown in , it is a schematic diagram of the original calculation, recalculatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a Trojan horse circuit detection and error recovery method during device operation, which includes the following steps: establishing original calculation and recalculation for Trojan horse circuit detection, and recovery calculation when the Trojan horse circuit is triggered and makes an error; Bind task nodes to IP cores; calculate the number of IP core manufacturers required by IP cores; match the optimal IP core manufacturer combination; determine task scheduling time and the number of IP cores; construct positioning and Replace the structure; check in real time whether the original calculation and recalculation results are the same, if not, locate the IP core where the activated Trojan horse circuit is located; replace the IP core where the activated Trojan horse circuit is located. The method can ensure that an output error is detected after the Trojan horse circuit is triggered and provide recovery calculations so that the system can run normally, and at the same time it can quickly locate the infected IP core and replace it before the system runs next time.

Description

technical field [0001] The invention relates to the field of computers, in particular to a Trojan horse circuit detection and error recovery method when a device in an integrated circuit is running, and in particular to a Trojan horse circuit detection and error recovery method when an untrustworthy third-party IP core is running. Background technique [0002] The globalization of integrated circuit design and manufacturing has made chip security and reliability an important issue, and the detection of Trojan horse circuits in integrated circuit design has always been the top priority. [0003] There are four main detection methods for general Trojan horse circuits, which are physical detection, bypass analysis, functional testing, and trusted design. They are all non-runtime detection methods and do not provide recovery calculations. We analyze four Trojan horse circuit detection methods respectively. (1) Physical detection, which is essentially a technology based on fail...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 崔晓通王若晗罗心烺
Owner CHONGQING UNIV OF POSTS & TELECOMM