scispace - formally typeset
Patent

Hardware Trojan horse detection system based on puf

TLDR
In this paper, the authors proposed a hardware Trojan horse detection system based on puf, which adds puf into a plurality of modules of an integrated chip (IC) in an original IC design file, sends the IC design files with puf to a factory for production, performs data acquisition on an IC sample produced by the factory according to the IC file with the puf under a test mode, analyzes the acquired data through a data analysis module and outputs a judgment result.
Abstract
The invention relates to a hardware Trojan horse detection system based on puf. The system adds the puf into a plurality of modules of an integrated chip (IC) in an original IC design file, sends the IC design file with the puf to a factory for production, performs data acquisition on an IC sample produced by the factory according to the IC design file with the puf under a test mode, analyzes the acquired data through a data analysis module and outputs a judgment result; and a user judges whether the original IC design in an original data storage module is modified according to original data judged by a data judgment module and judges whether to put the original data into production. The hardware Trojan horse detection system has the advantages that the shortcomings that the conventional detection method is complicated, high in test cost and long in time period, and the original design or the original IC is needed are overcome; whether hardware Trojan horses are contained can be stably and effectively detected; naturally, the fact that the Trojan horses are very difficult to trigger is not considered; the Trojan horses are detected physically; and therefore, most hardware Trojan horses can be detected.

read more

Citations
More filters
Patent

Hardware Trojan horse detection method and hardware Trojan horse detection system

Wang Liwei
TL;DR: In this paper, the authors proposed a hardware Trojan horse detection method and a HTH detection system based on a simple algorithm and short detection time, distinguishability and efficiency of hardware Trojan horses detection in integrated circuit testing are effectively improved.
Patent

Hardware Trojan horse recognition method based on neural network

TL;DR: In this article, the authors proposed a hardware Trojan horse recognition method based on a neural network using side channel information of a chip to be detected and performing data preprocessing, selecting a part of the chip to detect to perform back subdivision analysis and confirming whether a back subdivision chip contains hardware Trojan horses or not, and projecting all of the detected chips to the characteristic space through a pro-processed side-channel information matrix.
Patent

Hardware Trojan horse test system

TL;DR: In this paper, the authors present a hardware Trojan horse test system, which consists of a PC, an NI high-speed digital I/O board and a test circuit, wherein the PC is used for generating a test vector, conducting programming on an FPGA chip, controlling the NI high speed digital IO board, an oscilloscope and the FPGAs chip and receiving signals sent by the NI HSI board and the oscilloscope.
Patent

Method for detecting hardware trojan based on passive optical watermark

TL;DR: In this paper, a method for detecting hardware trojan based on a passive optical watermark was proposed, which consists of the following steps: inserting a spare cell into a circuit, changing the spare cell for adding underlying metal, so that the density of the underlying metal in the spare cells is higher than that of a general functional unit; secondly, performing simulation to obtain a reflection imaging picture, namely, the active watermark, of the hidden metal of the circuit on near-infrared light; thirdly, after circuit completion and before packaging, shooting an actual circuit from bottom
Patent

Hardware Trojan side channel detection method based on electromagnetism and delay

TL;DR: In this paper, the authors proposed a hardware Trojan bypass detection method based on electromagnetism and delay, and the corresponding proportional relationship between the current I(tot, m) consumed by a Trojan chip m and the maximum working frequency f(max, m).
References
More filters
Patent

Testing security of mapping functions

TL;DR: In this article, the authors present methods, apparatuses and articles for testing security of a mapping function (such as a Physically Unclonable Function) of an integrated circuit (IC) are disclosed.