Hamming distance-based digital microfluidic biochip field-level hardware Trojan horse detection method

A biochip and Hamming distance technology, applied in the fields of information security and hardware Trojan detection, can solve the problem that the degree of freedom of droplets cannot be reduced to zero, and achieve the effect of low cost, high efficiency and high accuracy

Active Publication Date: 2020-07-14
FUZHOU UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the chip architecture, the degree of freedom of the droplet cannot be reduced to zero, and it is only controlled by the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hamming distance-based digital microfluidic biochip field-level hardware Trojan horse detection method
  • Hamming distance-based digital microfluidic biochip field-level hardware Trojan horse detection method
  • Hamming distance-based digital microfluidic biochip field-level hardware Trojan horse detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0026] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0027] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Hamming distance-based digital microfluidic biochip field-level hardware Trojan horse detection method. The method comprises: acquiring a biochemical protocol stored in a digital microfluidic biochip platform; assuming that a malicious third party is tampered, giving two character strings, one being a gold drive sequence sold by a manufacturer and a series of field-levelimplemented drive sequences, and then from the beginning to the end of the reaction, entering the cyclic utilization difference of each time step to calculate the Hamming distance of the third party;and in each step of circulation, judging whether the calculated Hamming distance is greater than 0 or not by utilizing the calculated Hamming distance to obtain a key value, namely whether the key value is tampered or not. Once the on-site hardware Trojan horse is detected, operation is stopped immediately, and errors are prevented from becoming larger and larger. The program is continuously andcircularly executed through feedback processing. The method is low in cost, does not need special detection equipment, and is not affected by noise.

Description

technical field [0001] The invention relates to the technical field of information security and hardware Trojan horse detection, in particular to a digital microfluidic biological chip field-level hardware Trojan horse detection method based on Hamming distance. Background technique [0002] Microfluidic biochips constitute an emerging technology in bioautomation. In recent years, the development of manufacturing technology has made the development of this technology possible. A large number of biological protocols can be processed independently, simultaneously, and automated on coin-sized microfluidic platforms. Microfluidic biochips are mainly divided into two types: flow type and digital type (droplet type), see figure 1 , 2 . [0003] A typical DMFB (digital microfluidic biochip) consists of a two-dimensional (2D) electrode array and peripherals such as optical detectors, dispensing ports (for dispensing droplets) and control pins (for controlling electrodes). There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 董晨何辉郭文忠董旭东刘西蒙杨旸
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products