Hardware Trojan horse detection method based on Adaboost algorithm

A hardware Trojan detection and hardware Trojan technology, applied in the protection of internal/peripheral computer components, platform integrity maintenance, etc., can solve the problems of noise interference, low test coverage, etc., to reduce sample deviation, improve classification accuracy, reduce Effects of time and resource overhead

Active Publication Date: 2021-01-15
TIANJIN UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a hardware Trojan detection method based on the Adaboost algorithm. The invention is mainly used for detecting a hardware Trojan implanted in a circuit netlist in the circuit design process. Compared with traditional logic testing and side channel analysis methods, it may be due to Problems such as low test coverage and noise interference ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on Adaboost algorithm
  • Hardware Trojan horse detection method based on Adaboost algorithm
  • Hardware Trojan horse detection method based on Adaboost algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly indicates otherwise, the singular form is also intended to include the plural form. In addition, it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, it indicates There are features, steps, operations, parts or modules, components and / or combinations thereof.

[0029] It should be noted that the terms "first" and "second" in the description and claims of the present application and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware Trojan horse detection method based on Adaboost. The method comprises steps of defining the gate-level structure features of hardware Trojan horses, calibrating thepositions of all hardware Trojan horses in a netlist and the Trojan horse feature vectors of gate-level elements, building a training and testing data set, and building and training an Adaboost hardware Trojan horse detection model according to the data set. When the error rate of the model is lower than a set threshold value, the model can be used for detecting hardware Trojan horses in the circuit netlist to be detected.

Description

technical field [0001] The application belongs to the technical field of integrated circuit hardware Trojan horse detection, and specifically designs a hardware Trojan horse detection method based on the Adaboost algorithm. Background technique [0002] With the continuous expansion of the scale of integrated circuits, the complexity of SoC (System on chip) systems is getting higher and higher. Circuit designers usually need to use third-party IP (Intellectual Property) cores in the system to achieve corresponding functions, and IP cores from untrusted third-party designers may be artificially implanted into hardware Trojan horses during the design process, so , in order to ensure the security of the SoC system, it is necessary to effectively detect the hardware Trojan horse circuit that may be introduced in the circuit design process. At the same time, with the increase of circuit complexity, the static information and dynamic information contained in the SoC system are be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/76G06F21/55
CPCG06F21/76G06F21/55
Inventor 赵毅强李博文刘燕江何家骥马浩诚
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products