Hardware Trojan horse detection method based on lifting algorithm
A hardware Trojan detection and algorithm technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of multi-investment and detection time-consuming, infrequently used, and unable to achieve overall circuit detection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] The present invention will be further described below in conjunction with drawings and embodiments.
[0070] Such as Figure 4 Shown, the embodiment implemented according to the complete method of content of the present invention is as follows:
[0071] Download the following 37 integrated circuit layout files containing hardware Trojan horse tags from the public homepage of the github website, import them into the Xilinx ISE development environment, synthesize and implement them, and get their NP (number of original gates) NA (number of AND gates) and NO ( or number of gates).
[0072] Use achievement of the present invention, as figure 1 As shown in the process, the first and second controllability values and observability values of all nodes in each circuit are calculated in matlab software, and as figure 2 The flow shown performs cluster analysis on each circuit to obtain the characteristic matrix X' of each circuit. Taking these 37 characteristic matrix X'...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com