Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for effectively improving hardware Trojan activation probability

A hardware Trojan and probabilistic technology, applied in the direction of instruments, electronic digital data processing, platform integrity maintenance, etc., can solve the problems that the chip has no protection measures against hardware Trojans, does not have the ability to resist Trojans, and rare activation conditions, etc. The method is simple Ease of implementation, increased activation, and reduced verification time

Inactive Publication Date: 2017-05-31
TIANJIN UNIV
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Hardware Trojans are different from software Trojans. The detection of hardware Trojans in the chip testing stage may not be able to completely detect hardware Trojans. The chips put into production have no protective measures against hardware Trojans and do not have the ability to resist Trojans. This leads to the complete exposure of modern information systems to hardware. Under the attack of the Trojan horse, the losses caused are immeasurable. With the continuous development of semiconductor technology and integrated circuit design technology, hardware Trojan horse designers are designing more and more sophisticated hardware Trojan horses for specific purposes, that is, the area cost is getting smaller and smaller. The smaller, the rarer the activation conditions, the more unpredictable the payload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for effectively improving hardware Trojan activation probability
  • Method for effectively improving hardware Trojan activation probability
  • Method for effectively improving hardware Trojan activation probability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention utilizes the idea of ​​safety design, analyzes the circuit structure and node activity of the original circuit design on the basis of the virtual scanning trigger, implants a specific structure in the low-activity node according to the threshold probability, and removes the low-activity node in the circuit, Improve the circuit activity of the original design and the activation rate of the hardware Trojan horse, greatly reduce the randomness and uncertainty of the hardware Trojan horse activation, effectively shorten the activation time of the hardware Trojan horse, and improve the detection rate of the hardware Trojan horse to a certain extent.

[0032]With the development of semiconductor deep submicron technology, the number of chip integrated devices has increased exponentially with Moore's Law, the scale of chips has become larger, the functions of chips have become more and more, and the internal circuit structure has become more and more comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of integrated circuit trustworthiness detection, in order to effectively remove the low activity node in the circuit, to improve the activation of the circuit, to greatly shorten the activation time of the low active node and to reduce the random and the uncertainty of the activation time of the hardware Trojan horse in the process of the hardware Trojan horse detection to a great extent. In addition, in the combination of the bypass signal analysis method or the logic test method, the activation time of the hardware Trojan horse is greatly shortened and the detection rate of the hardware Trojan horse is effectively increased. The technical proposal of the method for effectively improving the hardware Trojan horse activation probability is an effective method for improving the activation probability of the hardware Trojan horse. The method comprises the following steps that1, generating a random test vector and an excitation circuit; 2, counting the transition information of each node of the circuit; 3, setting the critical probability threshold; 4, determining the location of the implanted node; 5, integrating the circuit and detecting. The integrated circuit trustworthiness detection is mainly applied to the case of the integrated circuit trustworthiness detection.

Description

technical field [0001] The invention relates to the technical field of integrated circuit trustworthiness detection, in particular to a method for effectively improving the activation probability of a hardware Trojan horse. Background technique [0002] With the continuous improvement of semiconductor manufacturing technology, integrated circuits are widely used in national life, especially in national security, military, communications, finance, transportation and other industries that are related to the lifeline of the country, and the design, manufacture, testing and packaging of integrated circuits are also The trend of economic globalization is gradually separating, and more and more third-party companies and personnel are involved. The chip processing process is not completely autonomous and controllable, and attackers can tamper with the original circuit design at any stage to form malicious circuits and monitor circuits. Activate the circuit in a specific state to te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/567
Inventor 赵毅强刘燕江何家骥刘阿强
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products