Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware Trojan horse detection method based on lifting algorithm

A hardware Trojan detection and algorithm technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of multi-investment and detection time-consuming, infrequently used, and unable to achieve overall circuit detection.

Active Publication Date: 2020-03-27
海宁利伊电子科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The functional test method requires an automatic test platform, which is tested by an exhaustive method of input test vectors, but due to the relatively large test time and test quantity, the application range is limited
Built-in self-test technology does not require external tools, but modules for testing must be added in the production process of the chip, and the detection of the overall circuit cannot be realized
Physical testing and bypass analysis require the use of high-precision testing instruments. The main feature of physical testing is reverse engineering analysis, but it is only suitable for chips with relatively simple structures, but because it requires more investment and testing time-consuming, and uncommonly used
The detection accuracy of bypass analysis is high, and at the same time, there are relatively few conditional restrictions, and the detection can be realized without triggering the Trojan horse. However, the physical quantities required by bypass analysis are difficult to observe accurately and are easily affected by noise, so its practical application is also difficult. subject to limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan horse detection method based on lifting algorithm
  • Hardware Trojan horse detection method based on lifting algorithm
  • Hardware Trojan horse detection method based on lifting algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described below in conjunction with drawings and embodiments.

[0070] Such as Figure 4 Shown, the embodiment implemented according to the complete method of content of the present invention is as follows:

[0071] Download the following 37 integrated circuit layout files containing hardware Trojan horse tags from the public homepage of the github website, import them into the Xilinx ISE development environment, synthesize and implement them, and get their NP (number of original gates) NA (number of AND gates) and NO ( or number of gates).

[0072] Use achievement of the present invention, as figure 1 As shown in the process, the first and second controllability values ​​and observability values ​​of all nodes in each circuit are calculated in matlab software, and as figure 2 The flow shown performs cluster analysis on each circuit to obtain the characteristic matrix X' of each circuit. Taking these 37 characteristic matrix X'...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan horse detection method based on a lifting algorithm. Processing according to the topological structure of the integrated circuit to obtain a first controllability value, a second controllability value and an observability value of each node of the integrated circuit; performing density-based clustering according to the first controllability value, the second controllability value and the observability value of each node of the integrated circuit to obtain a matrix of band class distances; and training classification is performed by adopting a weak classifier, the weak classifier is combined to obtain a final classifier, and then the final classifier is adopted to process the matrix X'with the class distance obtained by processing the to-be-detectedintegrated circuit so as to obtain the hardware Trojan horse detection result of the to-be-detected integrated circuit. The method provided by the invention has higher accuracy than a bypass analysismeans under a large sample condition.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit detection, and in particular relates to a hardware Trojan horse detection method based on a lifting algorithm. Background technique [0002] With the continuous development of the information society, the scale of integrated circuits is showing an explosive increase trend, and its security is constantly being challenged. A hardware Trojan horse refers to a circuit component that is deliberately added to a hardware circuit, or a defect or hidden danger left unintentionally during the development of an integrated circuit. Compared with traditional software Trojan horses, hardware Trojan horses have the characteristics of concealment, low trigger rate, complicated mechanism of action, and great harm once triggered. [0003] Existing hardware Trojan detection technologies are mainly divided into four categories, namely, physical detection and bypass analysis that require tools, and test-ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 吴承翰李尔平
Owner 海宁利伊电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products