Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan horse detection method based on deep learning

A technology of hardware Trojan detection and deep learning, which is applied in the field of image processing, can solve problems such as ineffective classification, difficult detection, and chip identification, and achieve the effects of reducing the missed detection rate of hardware Trojans, saving manpower and material resources, and improving resolution

Active Publication Date: 2021-01-29
XIDIAN UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the actual detection process, there are two problems in the hardware Trojan horse detection method based on electrical signals: one is that it is difficult to be actually detected due to the high concealment and low activation of the hardware Trojan horse; the other is that it is difficult to realize the full coverage detection of the chip
On the other hand, microscopic images of chips without hardware Trojans must exist in the sample chips using this method, otherwise, it is impossible to effectively classify and finally identify whether the chips carry hardware Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on deep learning
  • Hardware Trojan horse detection method based on deep learning
  • Hardware Trojan horse detection method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] refer to figure 1 , the specific implementation steps of the present invention are as follows:

[0026] Step 1: collect the low-resolution chip microscopic image set W, the high-resolution chip microscopic image set X and the corresponding master microscopic image set Y to construct a training set.

[0027] 1.1) The bare chip is extracted from the chip, and chemically treated to peel off each layer of the bare chip, and then each layer of the bare chip is polished to smoothness, and the 800 times lens and the 1600 times lens of the scanning electron microscope are respectively Take a complete low-resolution chip microscopic image and a complete high-resolution chip microscopic image;

[0028] 1.2) Analyze the IP core of the mother chip corresponding to the chip in 1.1), and obtain a complete master microscopic image;

[0029] 1.3) Capture the complete low-resolution chip microscopic image, the complete high-resolution chip microscopic image and the complete master mic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan horse detection method based on deep learning. The method mainly solves the problems that an existing method is high in cost, high in omission ratio and low in efficiency. According to the scheme, the method comprises the steps of collecting image sets, and constructing two training sets; collecting a to-be-detected image set; training the residual channelattention network by using the first training set, training the cyclic consistency generative adversarial network by using the second training set, and sequentially sending the microscopic images inthe to-be-detected image set to the trained residual channel attention network and the cyclic consistency generative adversarial network to obtain images which are homologous with the mother set microscopic images; enhancing the images homologous with the mother set microcosmic images and the corresponding mother set microcosmic images, and carrying out binarization segmentation and denoising on the enhanced images; connected region marking being carried out on the denoised image, exclusive-OR operation being carried out on the denoised image, and the region with the operation result being 1 being a hardware Trojan horse. The method has the advantages of higher detection precision, higher speed and simpler operation, and can be used for preparing an integrated circuit chip.

Description

technical field [0001] The invention belongs to the technical field of image processing, and further relates to a hardware Trojan horse detection method, which can be used in the preparation of integrated circuit chips. Background technique [0002] With the rapid development of integrated circuit chip design and manufacturing technology, the increasing popularity of third-party technical services reduces the cost of chip manufacturers on the one hand, shortens the cycle of their entry into the market, and on the other hand increases the risk of chip security performance. Reduced reliability of integrated circuits. Under the conditions of economic globalization, it is easy for malicious parties to add some extra malicious circuit logic units that do not belong to the original design specifications during the process from design to manufacturing of integrated circuit chips, which is also called "hardware Trojan horse". [0003] In order to reduce the risk of using chips to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/00G06T7/11G06T7/136G06T7/194G06T5/00
CPCG06T7/001G06T7/11G06T7/136G06T7/194G06T2207/10061G06T2207/30148G06T2207/20081G06T2207/20084G06T5/70
Inventor 张铭津彭晓琪郭杰李云松孙宸王力伟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products