System chip hardware Trojan horse detection method and system based on differential amplification controllability
A hardware Trojan detection and differential amplification technology, which is applied in computer parts, character and pattern recognition, internal/peripheral computer component protection, etc., to achieve good detection effect and good concealment characteristics
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] This embodiment provides a system chip hardware Trojan horse detection method based on differential amplification controllability, such as figure 1 , including the following steps:
[0045] S1: Obtain the gate-level netlist of the circuit to be tested;
[0046] S2: Obtain the controllability of the signal combination of the circuit under test;
[0047] S3: classify the signals whose combined controllability is greater than the threshold as Trojan horse signals;
[0048] S4: Calculate the differential amplification controllability of the remaining signal;
[0049] S5: Perform kmeans clustering on the differential amplification controllability of the remaining signals;
[0050] S6: Divide the kmeans clustering results into normal signal and Trojan horse signal output.
[0051] In step S1, when obtaining the gate-level netlist of the circuit to be tested for hardware Trojan detection, the RTL-level and gate-level designs are unified and synthesized into a gate-level de...
Embodiment 2
[0065] This embodiment provides a system chip hardware Trojan horse detection system based on differential amplification controllability, such as figure 2 , the detection system application embodiment 1 based on the differential amplification controllability system chip hardware Trojan horse detection method, including:
[0066] A gate-level netlist processing module, the gate-level netlist processing module obtains the gate-level netlist of the circuit to be tested;
[0067] ATPG module, described ATPG module obtains the combined controllability of circuit signal to be tested;
[0068] A signal processing module, wherein the signal processing module classifies signals whose combined controllability is greater than the threshold as Trojan horse signals and calculates the differential amplification controllability of the remaining signals;
[0069] A clustering module, the clustering module performs kmeans clustering on the differential amplification controllability of the re...
Embodiment 3
[0071] This embodiment provides the detection and clustering results of 8 Trojan horse platforms on the Trust-HUB in Embodiment 1, all Trojan horse trigger signals are detected, and the normal signals classified into the Trojan horse signal class are within an acceptable range. Other methods can be used to further confirm whether it is a Trojan horse signal.
[0072] Table 1 gives the image 3 and Figure 4 The 3 types of center points of the corresponding 8 platform clusters, the number of signals of each type, and the class to which the trigger signal is assigned. The trigger signal of the fourth platform is directly classified into the Trojan horse signal category in the signal processing module.
[0073] Table 2 shows the cluster distance and average contour value of each platform. The larger the distance between clusters or the larger the average contour value, it indicates that the clustering effect is better, and the signals can be divided into three obvious categorie...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com