Integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis

A hardware Trojan detection and integrated circuit technology, which is applied to computer components, internal/peripheral computer component protection, instruments, etc., to achieve the effects of reducing impact, high detection accuracy, and overcoming single feature selection

Active Publication Date: 2021-01-15
XIDIAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to address the deficiencies in the above-mentioned prior art, and propose a method for detecting integrated circuit hardware Trojan horses based on multi-parameter bypass analysis, which is used to solve the problem of detecting hardware Trojan horses that may be inserted in the production process of integrated circuits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis
  • Integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis
  • Integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Attached below figure 1 , to further describe in detail the specific steps for realizing the present invention.

[0032] Step 1, sectorize the IC netlist.

[0033] Select 1 integrated circuit (Integrated Circuit, IC) netlist without Trojan horse and 2 integrated circuit netlists with Trojan horse, start with each main output end of the integrated circuit netlist, and gate along the main output end The connection between the circuits is reversely searched, and it stops when it reaches the main input terminal corresponding to the main output terminal, and all the gate circuits found and the connection between them are divided into a sector, and the integrated circuit netlist is finally divided The number of sectors is the same as the number of main output terminals of the integrated circuit netlist.

[0034] The path with the longest path delay in each sector is selected as the critical path.

[0035] Combine below figure 2 Further describe the sector division.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis. The method comprises the following specific steps: (1) carrying out sector division on an integrated circuit netlist; (2) generating a multi-parameter bypass feature vector; (3) obtaining a Bayesian classifier; (4) detecting the integrated circuit to be detected; (5) judging the prediction label. Through sector division and generation of the multi-parameter bypass feature vector, the accuracy of integrated circuit hardware Trojan horse detection is improved, and Trojanhorse positioning is realized.

Description

technical field [0001] The invention belongs to the technical field of electronic devices, and further relates to an integrated circuit hardware Trojan horse detection method based on multi-parameter bypass analysis in the technical field of integrated circuit trustworthiness detection. The invention can be used to detect hardware Trojan horses that may be inserted in the integrated circuit production process. Background technique [0002] With the accelerated development of Internet of Things technology, embedded devices are ubiquitous in people's daily life, and they are connected to each other through the network to realize data exchange and information processing, and most embedded devices use integrated circuits. At present, the main security problem faced in integrated circuit design is hardware Trojan horse attack. Especially, this fact has affected some key fields, such as mobile communication, aerospace, medical treatment, military industry, nuclear reactor, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/76G06K9/62
CPCG06F21/76G06F18/214G06F18/29
Inventor 王泉黄钊杜茂繁刘鸿瑾李亮杨鹏飞
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products