scispace - formally typeset
Patent

Hardware Trojan real-time detection system and design method thereof

Xia Tongsheng, +1 more
Reads0
Chats0
TLDR
In this paper, a hardware Trojan horse real-time detection system and a design method thereof is presented, which consists of Trojan probes, a data transmission controller and a safety monitoring kernel.
Abstract
The invention provides a hardware Trojan horse real-time detection system and a design method thereof. The system comprises Trojan probes, a data transmission controller and a safety monitoring kernel. The Trojan probes acquire voltage bypass signals on power supply constraint lines inside an integrated circuit chip, and transmit the voltage bypass signals to the safety monitoring kernel for Trojan detection through the data transmission controller. The method comprises the following steps: the Trojan probes are implanted on the integrated circuit chip at the initial design stage to establishthe data transmission controller; a principal component analysis method is used to optimize the number of the Trojan probes and the optimal coordinates of the Trojan probes are obtained; a third-partyIP core is designed and integrated on the integrated circuit chip layout with the Trojan probe optimal coordinates; a security monitoring kernel is established to monitor the working state of IP corein real time; the abnormal behavior is identified by a support vector machine classification algorithm and the IP core with the Trojan is detected. The invention can detect and locate the IP core containing the Trojan in real time, and can find the Trojan behavior triggered under the low probability condition.

read more

Citations
More filters
Patent

Device and method for chip netlist level mixed confusion and defense of hardware Trojan horse, and detection method thereof

TL;DR: In this article, the authors present a detection method for hardware Trojan horses, which consists of more than one composite ring oscillator and a multifunctional controller which are respectively connected with the ring oscillators, where the chain head control unit and each chain internal display unit are sequentially connected into an end-to-end annular chain structure to form an annular oscillator.
Patent

A hardware Trojan horse detection method and device

TL;DR: In this paper, the authors proposed a hardware Trojan horse detection method and device, which comprises steps of obtaining instruction set power consumption data of a target circuit, preprocessing the instruction set data, calculating the median of the preprocessed instruction set Power Consumption data; judging whether the median is greater than a preset Trojan-free circuit power consumption value or not; if yes, inputting the pre-processed information into a linear SVM training upper boundary model for processing to obtain a hardware TroH detection result of the target circuit; and if not, outputting the information into the
Patent

Method and device for realizing A2 Trojan horse detection through compatible fault scanning test

TL;DR: In this paper, a method and device for realizing A2 Trojan horse detection through compatible fault scanning test, and the method comprises the following steps of S1, inserting a multifunctional controller and more than one composite ring oscillator in a gate-level netlist generation stage of a chip to be tested, and controlling the working mode of each composite ring Oscillator by the multicore controller.
Patent

Method for monitoring FPGA hardware Trojan horse in real time based on ring oscillators

TL;DR: In this article, a method for monitoring FPGA hardware Trojan horse in real-time based on ring oscillators is presented, which belongs to the field of security and reliability of integrated circuit chips.
Patent

IP core for automatically detecting hardware Trojan horse

TL;DR: In this paper, an IP core consisting of an initialization module, a data storage module and a training module is proposed to automatically detect hardware Trojan horses, which can be used to detect an external integrated circuit.