Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Gate-level hardware Trojan horse detection method based on multiple characteristic parameters

A feature parameter and multi-feature technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems that the accuracy of the detection result is difficult to guarantee, and a single feature parameter cannot fully reflect the node status in the gate-level netlist, so as to improve the detection Accuracy, the effect of improving accuracy

Active Publication Date: 2019-11-05
PEKING UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional single characteristic parameter cannot fully reflect the state of the nodes in the gate-level netlist, and the accuracy of the detection results is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gate-level hardware Trojan horse detection method based on multiple characteristic parameters
  • Gate-level hardware Trojan horse detection method based on multiple characteristic parameters
  • Gate-level hardware Trojan horse detection method based on multiple characteristic parameters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The multi-feature parameter-based door-level hardware Trojan detection method provided by the present invention will be described in detail below in conjunction with the accompanying drawings, but this does not constitute a limitation to the present invention.

[0020] The method mainly includes two parts, extracting multi-characteristic parameters in gate-level circuits and data processing. Among them, the feature parameters in the gate-level circuit are extracted including the following parts: jump probability, correlation, controllability and observability; the data processing part includes the following parts: sorting processing of jump probability, correlation clustering Analysis algorithms, controllability and observability cluster analysis methods, and multi-feature parameter fusion processing. The implementation steps of extraction of multiple feature parameters and data processing are as follows:

[0021] Part 1: Extract multiple feature parameters

[0022] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a gate-level hardware Trojan horse detection method based on multiple characteristic parameters. The method mainly comprises two parts: characteristic parameter extraction anddata processing. Specifically, characteristic parameters such as hopping probability, correlation, controllability and observability of a gate-level netlist are extracted in the detection process, the hopping probability reflects the activity degree of circuit nodes, the correlation reflects the correlation degree between the nodes, and the controllability and observability indicate the difficulty degree of node control and observation. Then, different algorithms are designed according to different parameter characteristics to distinguish normal nodes and Trojan horse nodes. According to themethod, the gate-level netlist hardware Trojan horse detection effect can be improved; the situation of all nodes in the circuit is reflected through multiple characteristic parameters, the possibility that a design company uses an IP core provided by a third party to introduce a hardware Trojan horse maliciously modifying the circuit in the chip design stage is reduced, and therefore the method can be universally applied to gate-level hardware Trojan horse detection and has high practicability.

Description

technical field [0001] The invention discloses a door-level hardware Trojan horse detection method based on multiple feature parameters. Specifically, in the chip design process, the IP core provided by the third party is synthesized into a gate-level netlist circuit, and in the gate-level netlist circuit, multiple features such as jump probability, correlation, controllability and observability are extracted Parameters, and then use the corresponding feature data processing algorithm to process the feature parameters. After all the data processing is completed, distinguish the normal part and the hardware Trojan part in the circuit. Background technique [0002] From the middle of the last century to the present, integrated circuits have continued to develop in accordance with Moore's Law, with rapid growth in scale and shrinking process sizes. Correspondingly, the design and manufacture of integrated circuits has become more and more complex. In this context, the process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 冯建华薛周鹏叶红飞
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products