Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan horse detection method and device

A technology of hardware Trojan detection and hardware Trojan, which is applied in the electronic field, can solve the problems of useless circuit side channel information timing, difficulty in detecting small Trojans, reducing detection practicability and reliability, etc., so as to avoid manual data processing and feature extraction , Reduce detection cost and time overhead, improve detection efficiency and accuracy

Active Publication Date: 2019-07-26
XIDIAN UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, past efforts in this area have had major limitations
Existing detection methods based on power consumption information are too vague to reflect the overall characteristics of large circuit designs, and it is difficult to detect small Trojan horses that exist widely in practice; detection methods based on path delays have insufficient data processing capabilities, large information loss, and require a large number of Test vectors; and in the existing aspects, the relevance of the timing of circuit side channel information is hardly used. With the reduction of the size of the integrated circuit process, the proportion of process noise in the manufacturing process becomes larger, and the Trojan horse is designed to be more concealed and Scattered, reducing the utility and reliability of detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method and device
  • Hardware Trojan horse detection method and device
  • Hardware Trojan horse detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0052] The present invention at first provides a kind of hardware Trojan detection method, as figure 1 shown, including:

[0053] Step 101: Sampling the path delay information of the positive and negative sample chips, constructing the path delay information data set of the positive and negative sample chips; corresponding to the positive and negative sample chip path delay information data sets, sampling the path delay information of the chip to be tested, and constructing the chip to be tested path delay information dataset;

[0054] Step 102: sending the positive and negative sample chip path delay information data sets into the neural network to be trained for training, adjusting various parameters of the neural network according ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware Trojan horse detection method and device. The method comprises the following steps: sampling path delay information of positive and negative sample chips, and constructing a path delay information data set of the positive and negative sample chips; performing path delay information sampling on the chip to be tested, and constructing a path delay information data set of the chip to be tested; sending the positive and negative sample chip path delay information data set into a to-be-trained neural network for training to obtain a neural network hardware Trojan horse detector; sending the path delay information data set of the chip to be tested into the neural network hardware Trojan detector, and extracting spatial structure characteristics of the path delaydata of the chip to be tested; taking the spatial structure characteristics of the path delay data of the chip to be tested as a time sequence, sending the time sequence into a neural network, and extracting the time sequence characteristics of the path delay data of the chip to be tested; and sending the time sequence characteristics of the path delay data of the chip to be tested to a classifier network, and judging whether the chip to be tested is infected with the hardware Trojan horse or not and which hardware Trojan horse is infected.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a hardware Trojan detection method and device. Background technique [0002] Integrated circuits are the cornerstone of modern electronic information systems and are widely used in key fields such as national defense, finance, communications, and energy. The credibility of integrated circuits is always an important security issue. Once maliciously attacked, it will not only affect personal security and privacy, but also cause unbearable losses to the country and society. [0003] A hardware Trojan horse is a malicious tampering of an integrated circuit. It is like a backdoor that can be inserted into the hardware and can be used by an opponent as a foothold to attack the system. Common attack methods of hardware Trojans include changing design specifications, destroying functions, leaking sensitive information, or denial of service. Hardware Trojans can be inserted into int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 史江义许志鹏员维维马佩军
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products