Hardware Trojan horse detection method based on LUT feature extraction and machine learning

A hardware Trojan detection and machine learning technology, applied in computer parts, instruments, computer-aided design, etc., can solve problems such as low detection accuracy and false positives, and achieve the effect of getting rid of dependence, low cost, and eliminating security threats

Pending Publication Date: 2022-08-05
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing hardware Trojan detection methods based on machine learning rely on manually extracted circuit features, the detection accuracy is not high, and there are false positives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on LUT feature extraction and machine learning
  • Hardware Trojan horse detection method based on LUT feature extraction and machine learning
  • Hardware Trojan horse detection method based on LUT feature extraction and machine learning

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0036] like figure 2 The IC design shown includes a hardware Trojan embedded by an untrusted third party. The hardware Trojan can be divided into two parts: trigger logic and load logic. The trigger logic is responsible for controlling whether the Trojan circuit is idle or triggered. Before being triggered, the Trojan does not affect the function of the original circuit. When the trigger conditions are met and the Trojan is activated, the load logic is responsible for implementing malicious effects on circuit functions, such as leaking sensitive information or causing system failure. Hardware Trojan designers try to hide Trojan circuits to avoid integrated circuit verification and testing. To achieve this, the designer needs to make the trojan effect appear only in rare cases, preferably after a long run to activate the trojan. In an embodiment of the present invention, the integrated circuit design to be tested is input in the form of register transfer level code.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware Trojan horse detection method based on LUT feature extraction and machine learning. The hardware Trojan horse detection method comprises the following steps: inputting an integrated circuit design embedded with a hardware Trojan horse as a training set; designing and synthesizing the training integrated circuit into a field programmable gate array netlist; hardware Trojan horse feature extraction is carried out on the FPGA netlist, and generated training quantization feature values are stored; training a machine learning classifier by using the training quantization feature value to generate an optimal hardware Trojan classifier; inputting a to-be-detected integrated circuit design; designing and synthesizing a to-be-detected integrated circuit into a to-be-detected FPGA netlist; hardware Trojan horse feature extraction is carried out on the FPGA netlist to be measured, and generated feature values to be measured are stored; and inputting a to-be-measured characteristic value into the trained hardware Trojan classifier, and dividing the to-be-detected integrated circuit into Trojan nodes and normal nodes, thereby realizing Trojan detection. According to the method, hardware Trojan horse detection activated based on specific conditions can be realized, and hardware Trojan horse potential safety hazards can be detected in the early stage of integrated circuit design.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit hardware security, and in particular relates to a hardware Trojan horse detection method. Background technique [0002] In order to improve the efficiency of product development and shorten the time to market, modern integrated circuit designs use a large number of intellectual property (IP) cores provided by untrusted third parties. These IP cores may contain malicious design modifications outside the design specifications, that is, hardware Trojan horses. Hardware Trojans have the characteristics of light weight and high concealment. In order to avoid being discovered, hardware Trojans spend most of the time in a dormant state and will only be activated under certain conditions. Once the hardware Trojan is activated, it may cause abnormal functions of integrated circuits, performance degradation, leakage of sensitive information, and even remote control of the chips, posing a serious ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F30/327G06F30/34G06K9/62
CPCG06F30/327G06F30/34G06F18/2411G06F18/24323Y02D10/00
Inventor 武玲娟胡伟李一玮
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products