Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Hardware Trojan Detection Method Based on Lifting Algorithm

A hardware Trojan detection and algorithm technology, applied in the direction of internal/peripheral computer component protection, can solve the problems of infrequent use, multi-investment, time-consuming detection, limitations, etc., to reduce classification error rate, improve fault detection efficiency, and process simple effect

Active Publication Date: 2022-07-26
海宁利伊电子科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The functional test method requires an automatic test platform, which is tested by an exhaustive method of input test vectors, but due to the relatively large test time and test quantity, the application range is limited
Built-in self-test technology does not require external tools, but modules for testing must be added in the production process of the chip, and the detection of the overall circuit cannot be realized
Physical testing and bypass analysis require the use of high-precision testing instruments. The main feature of physical testing is reverse engineering analysis, but it is only suitable for chips with relatively simple structures, but because it requires more investment and testing time-consuming, and uncommonly used
The detection accuracy of bypass analysis is high, and at the same time, there are relatively few conditional restrictions, and the detection can be realized without triggering the Trojan horse. However, the physical quantities required by bypass analysis are difficult to observe accurately and are easily affected by noise, so its practical application is also difficult. subject to limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hardware Trojan Detection Method Based on Lifting Algorithm
  • A Hardware Trojan Detection Method Based on Lifting Algorithm
  • A Hardware Trojan Detection Method Based on Lifting Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0070] like Figure 4 As shown, an embodiment of the implementation of the complete method according to the content of the present invention is as follows:

[0071] Download the following 37 integrated circuit layout files containing hardware Trojan tags from the public homepage of the github website, import them into the Xilinx ISE development environment, synthesize, implement, and get their NP (number of original gates) NA (number of AND gates) and NO ( or number of gates).

[0072] Using the results of the present invention, such as figure 1 As shown in the process, the first and second controllability values ​​and observability values ​​of all nodes in each circuit are calculated in the matlab software, and are calculated as follows figure 2 The shown process performs cluster analysis on each circuit to obtain the feature matrix X' of each circui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware Trojan detection method based on a lifting algorithm. The first and second controllability values ​​and the observability values ​​of each node of the integrated circuit are obtained by processing according to the topology of the integrated circuit; the first and second controllability values ​​and the observability values ​​of each node of the integrated circuit are Based on density clustering, a matrix with class distances is obtained; a weak classifier is used for training classification, and the weak classifiers are combined to obtain a final classifier, and then a matrix X' with class distances obtained by processing the integrated circuit to be tested is used by the final classifier Processing is performed to obtain the hardware Trojan detection result of the integrated circuit to be tested. The present invention has higher accuracy than the bypass analysis method under the condition of large sample.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit detection, and in particular relates to a hardware Trojan detection method based on a lifting algorithm. Background technique [0002] With the continuous development of the information society, the scale of integrated circuits is increasing explosively, and its security is constantly being challenged. A hardware Trojan refers to a circuit component that is deliberately added to a hardware circuit, or a defect or hidden danger that is unintentionally left in the process of developing an integrated circuit. Compared with traditional software Trojans, hardware Trojans have the characteristics of concealment, low trigger rate, complex mechanism of action, and great harm once triggered. [0003] The existing hardware Trojan detection technologies are mainly divided into four categories, namely, physical detection and bypass analysis that require tools, and four categories of technologies b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 吴承翰李尔平
Owner 海宁利伊电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products