CN104950246A - Hardware trojan detection method and system based on time delay - Google Patents

Hardware trojan detection method and system based on time delay Download PDF

Info

Publication number
CN104950246A
CN104950246A CN201510318921.7A CN201510318921A CN104950246A CN 104950246 A CN104950246 A CN 104950246A CN 201510318921 A CN201510318921 A CN 201510318921A CN 104950246 A CN104950246 A CN 104950246A
Authority
CN
China
Prior art keywords
measured
signal path
chip
hardware trojan
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510318921.7A
Other languages
Chinese (zh)
Other versions
CN104950246B (en
Inventor
何春华
侯波
王力纬
恩云飞
谢少锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fifth Electronics Research Institute of Ministry of Industry and Information Technology
Original Assignee
Fifth Electronics Research Institute of Ministry of Industry and Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fifth Electronics Research Institute of Ministry of Industry and Information Technology filed Critical Fifth Electronics Research Institute of Ministry of Industry and Information Technology
Priority to CN201510318921.7A priority Critical patent/CN104950246B/en
Publication of CN104950246A publication Critical patent/CN104950246A/en
Application granted granted Critical
Publication of CN104950246B publication Critical patent/CN104950246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a hardware trojan detection method and system based on time delay. The method comprises the following steps of firstly obtaining bypass time delay information of a chip to be detected, wherein the bypass time delay information includes an amplitude frequency response curve and/or a phase frequency response curve of each signal path of the chip to be detected; obtaining the resonance valley frequency and the resonance peak frequency of each signal path in the chip to be detected according to the bypass time delay information; finally and respectively comparing the resonance valley frequency and the resonance peak frequency of each signal path in the chip to be detected with the corresponding preset resonance valley frequency threshold and the resonance peak frequency threshold of each signal path; judging whether hardware Trojan exists in the chip to be detected or not according to the comparison result. The addition of the additional chip area for test is not needed, the workload and the test cost are greatly reduced, and the work efficiency is improved.

Description

Based on hardware Trojan horse detection method and the system of time delay
Technical field
The present invention relates to integrated circuit detection technique field, particularly relate to a kind of hardware Trojan horse detection method based on time delay and system.
Background technology
Along with the development of semiconductor technology, hardware outsourcing design and flow become the trend of globalization, have occurred a kind of New Hardware attack pattern for integrated circuit (IC) chip in recent years, have been called " hardware Trojan horse ".Hardware Trojan horse mainly refers to that malice is added some illegal circuit or distorts original design file artificially in IC (integrated circuit, integrated circuit) Design and manufacture process, thus leaves " time bomb " or " electronics back door " etc.
Existing hardware Trojan horse detection method mainly judges whether there is wooden horse in chip by the by-passing signal detected in analysis circuit, as maximum operation frequency, time delay, power consumption, static state and dynamic current, electromagnetism and thermal effect etc., come whether there is wooden horse in decision circuitry.But traditional hardware Trojan horse based on by-passing signal analysis detects to be needed to characterize the time-delay characteristics of chip at integrated circuit critical path insertion shadow register or ring oscillator or carry out scanning monitoring to the clock of critical path, when integrated circuit has the path of more than 1,000,000, hardware Trojan horse not necessarily colonizes among critical path, therefore shadow register or ring oscillator are inserted to critical path or carry out clock scan monitoring and differ and detect hardware Trojan horse surely, if increase the detection to non-critical path, then need to increase extra chip area to test, greatly can increase workload and testing cost.
Summary of the invention
Based on above-mentioned situation, the present invention proposes a kind of hardware Trojan horse detection method based on time delay and system, reduce workload and testing cost, improve testing efficiency.
To achieve these goals, the embodiment of technical solution of the present invention is:
Based on a hardware Trojan horse detection method for time delay, comprise the following steps:
Obtain the bypass delayed data of chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Resonance paddy frequency and the harmonic peak frequency of each signal path in described chip to be measured is obtained according to described bypass delayed data;
The resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judges whether there is hardware Trojan horse in described chip to be measured according to comparative result.
The embodiment of technical solution of the present invention is:
Based on a hardware Trojan horse detection system for time delay, comprising:
Acquisition module, for obtaining the bypass delayed data of chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Processing module, for obtaining resonance paddy frequency and the harmonic peak frequency of each signal path of described chip to be measured according to described bypass delayed data;
Detection module, for the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency being compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge whether there is hardware Trojan horse in described chip to be measured according to comparative result.
Compared with prior art, beneficial effect of the present invention is: the hardware Trojan horse detection method and the system that the present invention is based on time delay, resonance paddy frequency and the harmonic peak frequency of each signal path in chip to be measured is obtained according to the bypass delayed data of the chip to be measured obtained, the resonance paddy frequency of each signal path and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge whether there is hardware Trojan horse in chip to be measured according to comparative result, extra chip area need not be increased test, greatly reduce workload and testing cost, be of very high actual application value.
Accompanying drawing explanation
Fig. 1 is the hardware Trojan horse detection method process flow diagram based on time delay in an embodiment;
Fig. 2 is the theory diagram based on the sweep check of clock network path in an embodiment;
Fig. 3 is the equivalent physical model figure that the annexation between Fig. 2 clock CLK1 pin and CLK2 pin is abstract;
Fig. 4 is the hardware Trojan horse testing result schematic diagram of wooden horse chip and non-wooden horse chip in an embodiment;
Fig. 5 is for based on the hardware Trojan horse detection method process flow diagram based on time delay in the concrete example of method one shown in Fig. 1;
Fig. 6 is the hardware Trojan horse detection system structural representation based on time delay in an embodiment.
Embodiment
For making object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is described in further detail.Should be appreciated that embodiment described herein only in order to explain the present invention, do not limit protection scope of the present invention.
Based on the hardware Trojan horse detection method of time delay in an embodiment, as shown in Figure 1, comprise the following steps:
Step S101: the bypass delayed data obtaining chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Step S102: the resonance paddy frequency and the harmonic peak frequency that obtain each signal path in described chip to be measured according to described bypass delayed data;
Step S103: the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judges whether there is hardware Trojan horse in described chip to be measured according to comparative result.
Known from the above description, the present invention is based on the hardware Trojan horse detection method of time delay, by determining resonance paddy frequency and the harmonic peak frequency of each signal path in chip to be measured to the bypass delayed data of the chip to be measured obtained, whether hardware Trojan horse is there is according in the resonance paddy frequency of each signal path and harmonic peak frequency detecting chip to be measured, test without the need to increasing extra chip area, reduce test job amount and testing cost, improve testing efficiency, have very high actual application value.
As an embodiment, the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge that the step that whether there is hardware Trojan horse in described chip to be measured comprises according to comparative result:
Relational matrix is obtained according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency:
G = g 11 g 12 · · · g 1 n g 21 g 22 · · · g 2 n · · · · · · · · · · · · g m 1 g m 2 · · · g mn , Wherein m represents total number of input signal in described chip to be measured, and n represents the total number outputed signal in described chip to be measured, wherein f xy2represent the resonance paddy frequency of signal path, f xy1represent the harmonic peak frequency of signal path;
The parameter that parameter in described relational matrix G is corresponding with preset relation matrix G ' compares, and judges whether there is hardware Trojan horse in described chip to be measured, wherein according to comparative result G ′ = g 11 ′ g 12 ′ · · · g 1 n ′ g 21 ′ g 22 ′ · · · g 2 n ′ · · · · · · · · · · · · g m 1 ′ g m 2 ′ · · · h mn ′ , g xy ′ = f xy 2 ′ 2 f xy 1 ′ 2 , F ' xy2represent the default resonance paddy frequency threshold of signal path, f ' xy1represent the default harmonic peak frequency threshold of signal path, wherein x=1,2 ..., m, y=1,2 ..., n;
As shown in Figure 2 in an embodiment based on the theory diagram of clock network path sweep check, the abstract equivalent physical model of annexation wherein between clock CLK1 pin and CLK2 pin as shown in Figure 3, wherein, R, L are respectively parasitic lumped resistance and the inductance of interconnection line between clock network CLK1 pin and CLK2 pin, C 1be the parasitic lumped capacitance between two pins, C 2for the load capacitance of clock pins CLK2 and the summation of stray capacitance over the ground, V infor the swept frequency excitation voltage signal of CLK1 input, V outfor the response signal that CLK2 exports, the mathematical transfer function of this circuit model can be obtained from frequency domain:
G ( s ) = V out ( s ) V in ( s ) = 1 + sR C 1 + s 2 L C 1 1 + sR ( C 1 + C 2 ) + s 2 L ( C 1 + C 2 ) ,
G (s) can see a second order band as and lead to the superposition with rejection filter, wherein passband central frequency (harmonic peak frequency) quality factor stopband center frequency (resonance paddy frequency) f 2 = 1 2 π 1 L C 1 , Quality factor Q 2 = L R 2 C 1 , Obtain further g = f 2 2 f 1 2 = Q 2 2 Q 1 2 = 1 + C 2 C 1 ; Consider technological fluctuation, i-th g value without hardware Trojan horse chip is: wherein, Δ C i, 1with Δ C i, 2for the electric capacity Small variables that different chip technology fluctuation is introduced, during consideration technological fluctuation, g value becomes large; Consider that there is hardware Trojan horse in chip can produce extra parasitic load capacitance C t, the g value of a jth hardware Trojan horse chip is: when there is hardware Trojan horse in chip, g value becomes large further; Visible have the g value of hardware Trojan horse chip to be greater than g value without hardware Trojan horse chip, C tlarger, then distinguish more obvious, resolution is higher, and these characteristics may be embodied in or relation curve in, have hardware Trojan horse chip owing to producing extra parasitic load capacitance C t, resonance frequency diminishes, and quality factor diminishes, and therefore, path delay characteristic can be reflected by spectral response (amplitude-frequency response and/or phase-frequency response curve), can carry out the detection analysis of hardware Trojan horse according to this characteristic; Can predetermined threshold value g ' according to above-mentioned analysis, when the g value of chip to be measured is greater than predetermined threshold value g ', judge to there is hardware Trojan horse in chip, when the g value of chip to be measured is less than predetermined threshold value g ', judge in chip without hardware Trojan horse;
Consider in complex chip there is m input signal, n output signal, then can obtain relational matrix according to above-mentioned analysis G = g 11 g 12 · · · g 1 n g 21 g 22 · · · g 2 n · · · · · · · · · · · · g m 1 g m 2 · · · g mn , By the parameter g in matrix G xywith corresponding predetermined threshold value g ' xycompare, work as g xybe greater than g ' xytime, judge to there is hardware Trojan horse in chip, simple, accurate, be applicable to application;
The hardware Trojan horse testing result of wooden horse chip and non-wooden horse chip in an embodiment as shown in Figure 4, wherein the hardware Trojan horse circuit area of wooden horse chip and the ratio of original chip circuit area are 0.1%, carry out clock network sweep check obtain amplitude-frequency response to this wooden horse chip and non-wooden horse chip; Resonance paddy frequency and the harmonic peak frequency of each clock signal in wooden horse chip and non-wooden horse chip is obtained according to amplitude-frequency response; Obtain respective relational matrix according to the resonance paddy frequency of each clock signal in wooden horse chip and non-wooden horse chip and harmonic peak frequency and map, wooden horse chip and non-wooden horse chip can separate completely, dotted line is their boundary line, verifies the correctness of above-mentioned analysis.
As an embodiment, after judge whether there is hardware Trojan horse in described chip to be measured according to comparative result, also comprise step:
When judging to there is hardware Trojan horse in described chip to be measured, locate the path of described hardware Trojan horse according to the parameter in described relational matrix G;
Work as g xybe greater than corresponding predetermined threshold value g ' xytime, judge to there is hardware Trojan horse, g in chip to be measured xyrepresent that in chip to be measured, an xth input signal exists hardware Trojan horse to the signal path that y outputs signal, path orientation greatly can improve the efficiency of subsequent physical positioning analysis, reduces workload and testing cost.
As an embodiment, after obtaining relational matrix G according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency, before being compared by the parameter that parameter in described relational matrix G is corresponding with preset relation matrix G ', also comprise step:
Feature extraction is carried out to described relational matrix G and described preset relation matrix G ';
Carry out feature extraction, remove the common mode information between relational matrix G and preset relation matrix G ', amplify the differential mode information between them, improve feature accuracy of identification.
As an embodiment, described signal path comprises clock network path or electric power network path, each chip has multiple clock network or electric power network, and the hardware Trojan horse of sequential type or incorporating aspects type is directly or indirectly connected with clock network or electric power network, therefore the existence of hardware Trojan horse will inevitably bring impact to clock network path or electric power network path delay, can carry out the detection analysis of hardware Trojan horse according to this characteristic; Above-mentioned signal path can also comprise other signal network path except clock network path and electric power network path.
In order to understand this method better, below elaborate a hardware Trojan horse detection method application example, this application example is applied to clock network path.
As shown in Figure 5, this application example can comprise the following steps:
Step S501: the amplitude-frequency response being obtained the clock network path of chip to be measured by sinusoidal wave sweep check;
Step S502: the resonance paddy frequency and the harmonic peak frequency that obtain each signal path in chip to be measured according to the amplitude-frequency response in the clock network path of the chip to be measured of above-mentioned acquisition;
Step S503: obtain relational matrix according to the resonance paddy frequency of each signal path in above-mentioned chip to be measured and harmonic peak frequency:
G = g 11 g 12 · · · g 1 n g 21 g 22 · · · g 2 n · · · · · · · · · · · · g m 1 g m 2 · · · g mn , Wherein m represents total number of input signal in chip to be measured, and n represents in chip to be measured the total number outputed signal, wherein f xy2represent the resonance paddy frequency of signal path, f xy1represent the harmonic peak frequency of signal path, wherein x=1,2 ..., m, y=1,2 ..., n;
Step S504: adopt statistical study or mode identification method to carry out feature extraction to above-mentioned relation matrix G and preset relation matrix G ', wherein preset relation matrix G ′ = g 11 ′ g 12 ′ · · · g 1 n ′ g 21 ′ g 22 ′ · · · g 2 n ′ · · · · · · · · · · · · g m 1 ′ g m 2 ′ · · · h mn ′ , Wherein f ' xy2represent the default resonance paddy frequency threshold of signal path, f ' xy1represent the default harmonic peak frequency threshold of signal path; Carry out feature extraction, remove the common mode information between relational matrix G and preset relation matrix G ', amplify the differential mode information between them, improve feature accuracy of identification;
Step S505: will the g after feature extraction in relational matrix G be carried out xywith the g ' carried out after feature extraction in relational matrix G ' xycompare, work as g xybe greater than g ' xytime, judge to there is hardware Trojan horse in chip to be measured;
Step S506: according to g xythe path of above-mentioned hardware Trojan horse is located in chip to be measured; g xyrepresent that in chip to be measured, an xth input signal exists hardware Trojan horse to the signal path that y outputs signal, path orientation greatly can improve the efficiency of subsequent physical positioning analysis, reduces workload and testing cost.
This application example obtains resonance paddy frequency and the harmonic peak frequency of each signal path in chip to be measured according to the amplitude-frequency response in the clock network path of the chip to be measured obtained, the relational matrix of chip to be measured is determined according to the resonance paddy frequency of each signal path and harmonic peak frequency, the relational matrix of chip to be measured and preset relation matrix are compared, judge whether there is hardware Trojan horse in chip to be measured according to comparative result, extra chip area need not be increased test, greatly reduce workload and testing cost, be applicable to application.
Based on the hardware Trojan horse detection system of time delay in an embodiment, as shown in Figure 6, comprising:
Acquisition module 601, for obtaining the bypass delayed data of chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Processing module 602, for obtaining resonance paddy frequency and the harmonic peak frequency of each signal path of described chip to be measured according to described bypass delayed data;
Detection module 603, for the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency being compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge whether there is hardware Trojan horse in described chip to be measured according to comparative result.
As shown in Figure 6, first acquisition module 601 obtains the bypass delayed data of chip to be measured; Then processing module 602 obtains resonance paddy frequency and the harmonic peak frequency of each signal path of chip to be measured according to above-mentioned bypass delayed data; The resonance paddy frequency of each signal path in chip to be measured and harmonic peak frequency compare with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold by last detection module 603 respectively, judge whether there is hardware Trojan horse in chip to be measured according to comparative result.
Known from the above description, the present invention is based on the hardware Trojan horse detection system of time delay, extra chip area need not be increased and test, greatly reduce workload and testing cost, realistic application.
As an embodiment, described detection module 603 comprises:
Processing unit 6031, for obtaining relational matrix according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency: G = g 11 g 12 · · · g 1 n g 21 g 22 · · · g 2 n · · · · · · · · · · · · g m 1 g m 2 · · · g mn , Wherein m represents total number of input signal in described chip to be measured, and n represents the total number outputed signal in described chip to be measured, wherein f xy2represent the resonance paddy frequency of signal path, f xy1represent the harmonic peak frequency of signal path;
Judging unit 6032, compares for the parameter that the parameter in described relational matrix G is corresponding with preset relation matrix G ', judges whether there is hardware Trojan horse in described chip to be measured, wherein according to comparative result G ′ = g 11 ′ g 12 ′ · · · g 1 n ′ g 21 ′ g 22 ′ · · · g 2 n ′ · · · · · · · · · · · · g m 1 ′ g m 2 ′ · · · h mn ′ , g xy ′ = f xy 2 ′ 2 f xy 1 ′ 2 , F ' xy2represent the default resonance paddy frequency threshold of signal path, f ' xy1represent the default harmonic peak frequency threshold of signal path, wherein x=1,2 ..., m, y=1,2 ..., n;
There is the g value of hardware Trojan horse chip different from the g value without hardware Trojan horse chip, the g value of hardware Trojan horse chip is had to be greater than g value without hardware Trojan horse chip, can predetermined threshold value g ' according to this characteristic, when the g value of chip to be measured is greater than predetermined threshold value g ', judge to there is hardware Trojan horse in chip, when the g value of chip to be measured is less than predetermined threshold value g ', judge in chip without hardware Trojan horse.
As an embodiment, also comprise locating module 604, after detecting at described detection module 603 and there is hardware Trojan horse in described chip to be measured, locate the path of described hardware Trojan horse according to the parameter in described relational matrix G;
Work as g xybe greater than corresponding predetermined threshold value g ' xytime, judge to there is hardware Trojan horse, g in chip to be measured xyrepresent that in chip to be measured, an xth input signal exists hardware Trojan horse to the signal path that y outputs signal, path orientation greatly can improve the efficiency of subsequent physical positioning analysis, reduces workload and testing cost.
As an embodiment, described detection module 603 also comprises extraction unit 6033, for after described processing unit 6031 obtains relational matrix G according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency, feature extraction is carried out to described relational matrix G and described preset relation matrix G ';
Described judging unit 6032 by the parameter in relational matrix G after carrying out feature extraction with carry out feature extraction after parameter corresponding in relational matrix G ' compare, judge whether there is hardware Trojan horse in described chip to be measured according to comparative result;
Carry out feature extraction, remove the common mode information between relational matrix G and preset relation matrix G ', amplify the differential mode information between them, improve feature accuracy of identification.
As an embodiment, described signal path comprises clock network path or electric power network path, each chip has multiple clock network or electric power network, and the hardware Trojan horse of sequential type or incorporating aspects type is all directly or indirectly connected with clock network or electric power network, therefore the existence of hardware Trojan horse will inevitably bring impact to clock network path or electric power network path delay, can carry out the detection analysis of hardware Trojan horse according to this characteristic; Above-mentioned signal path can also comprise other signal network path except clock network path and electric power network path.
Each technical characteristic of the above embodiment can combine arbitrarily, for making description succinct, each technical characteristic (as phase-frequency response curve etc.) all possible combination in above-described embodiment is not all described, but, as long as the combination of these technical characteristics does not exist contradiction, be all considered to be the scope that this instructions is recorded.
The above embodiment only have expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be construed as limiting the scope of the patent.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1., based on a hardware Trojan horse detection method for time delay, it is characterized in that, comprise the following steps:
Obtain the bypass delayed data of chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Resonance paddy frequency and the harmonic peak frequency of each signal path in described chip to be measured is obtained according to described bypass delayed data;
The resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judges whether there is hardware Trojan horse in described chip to be measured according to comparative result.
2. the hardware Trojan horse detection method based on time delay according to claim 1, it is characterized in that, the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency are compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge that the step that whether there is hardware Trojan horse in described chip to be measured comprises according to comparative result:
Relational matrix is obtained according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency:
G = g 11 g 12 . . . g 1 n g 21 g 22 . . . g 2 n . . . . . . . . . . . . g m 1 g m 2 . . . g mn , Wherein m represents total number of input signal in described chip to be measured, and n represents the total number outputed signal in described chip to be measured, wherein f xy2represent the resonance paddy frequency of signal path, f xy1represent the harmonic peak frequency of signal path;
The parameter that parameter in described relational matrix G is corresponding with preset relation matrix G ' compares, and judges whether there is hardware Trojan horse in described chip to be measured, wherein according to comparative result G ′ = g 11 ′ g 12 ′ . . . g 1 n ′ g 21 ′ g 22 ′ . . . g 2 n ′ . . . . . . . . . . . . g m 1 ′ g m 2 ′ . . . g mn ′ , f ' xy2represent the default resonance paddy frequency threshold of signal path, f ' xy1represent the default harmonic peak frequency threshold of signal path, wherein x=1,2 ..., m, y=1,2 ..., n.
3. the hardware Trojan horse detection method based on time delay according to claim 2, is characterized in that, after judge whether there is hardware Trojan horse in described chip to be measured according to comparative result, also comprises step:
When judging to there is hardware Trojan horse in described chip to be measured, locate the path of described hardware Trojan horse according to the parameter in described relational matrix G.
4. the hardware Trojan horse detection method based on time delay according to Claims 2 or 3, it is characterized in that, after obtaining relational matrix G according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency, before being compared by the parameter that parameter in described relational matrix G is corresponding with preset relation matrix G ', also comprise step:
Feature extraction is carried out to described relational matrix G and described preset relation matrix G '.
5. the hardware Trojan horse detection method based on time delay according to claim 1, is characterized in that, described signal path comprises clock network path or electric power network path.
6. based on a hardware Trojan horse detection system for time delay, it is characterized in that, comprising:
Acquisition module, for obtaining the bypass delayed data of chip to be measured, described bypass delayed data comprises amplitude-frequency response and/or the phase-frequency response curve of each signal path of described chip to be measured;
Processing module, for obtaining resonance paddy frequency and the harmonic peak frequency of each signal path of described chip to be measured according to described bypass delayed data;
Detection module, for the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency being compared with the default resonance paddy frequency threshold of each corresponding signal path and harmonic peak frequency threshold respectively, judge whether there is hardware Trojan horse in described chip to be measured according to comparative result.
7. the hardware Trojan horse detection system based on time delay according to claim 6, is characterized in that, described detection module comprises:
Processing unit, for obtaining relational matrix according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency: G = g 11 g 12 . . . g 1 n g 21 g 22 . . . g 2 n . . . . . . . . . . . . g m 1 g m 2 . . . g mn , Wherein m represents total number of input signal in described chip to be measured, and n represents the total number outputed signal in described chip to be measured, wherein f xy2represent the resonance paddy frequency of signal path, f xy1represent the harmonic peak frequency of signal path;
Judging unit, compares for the parameter that the parameter in described relational matrix G is corresponding with preset relation matrix G ', judges whether there is hardware Trojan horse in described chip to be measured, wherein according to comparative result G ′ = g 11 ′ g 12 ′ . . . g 1 n ′ g 21 ′ g 22 ′ . . . g 2 n ′ . . . . . . . . . . . . g m 1 ′ g m 2 ′ . . . g mn ′ , f ' xy2represent the default resonance paddy frequency threshold of signal path, f ' xy1represent the default harmonic peak frequency threshold of signal path, wherein x=1,2 ..., m, y=1,2 ..., n.
8. the hardware Trojan horse detection system based on time delay according to claim 7, it is characterized in that, also comprise locating module, for there is hardware Trojan horse in the described chip to be measured of described detection module detection after, locate the path of described hardware Trojan horse according to the parameter in described relational matrix G.
9. the hardware Trojan horse detection system based on time delay according to claim 7 or 8, it is characterized in that, described detection module also comprises extraction unit, for after described processing unit obtains relational matrix G according to the resonance paddy frequency of each signal path in described chip to be measured and harmonic peak frequency, feature extraction is carried out to described relational matrix G and described preset relation matrix G ';
Described judging unit by the parameter in relational matrix G after carrying out feature extraction with carry out feature extraction after parameter corresponding in relational matrix G ' compare, judge whether there is hardware Trojan horse in described chip to be measured according to comparative result.
10. the hardware Trojan horse detection system based on time delay according to claim 6, is characterized in that, described signal path comprises clock network path or electric power network path.
CN201510318921.7A 2015-06-11 2015-06-11 Hardware Trojan horse detection method and system based on delay Active CN104950246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510318921.7A CN104950246B (en) 2015-06-11 2015-06-11 Hardware Trojan horse detection method and system based on delay

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510318921.7A CN104950246B (en) 2015-06-11 2015-06-11 Hardware Trojan horse detection method and system based on delay

Publications (2)

Publication Number Publication Date
CN104950246A true CN104950246A (en) 2015-09-30
CN104950246B CN104950246B (en) 2017-09-19

Family

ID=54165045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510318921.7A Active CN104950246B (en) 2015-06-11 2015-06-11 Hardware Trojan horse detection method and system based on delay

Country Status (1)

Country Link
CN (1) CN104950246B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105807204A (en) * 2016-03-08 2016-07-27 天津大学 Spectrum refinement-based hardware Trojan detection method
CN106771960A (en) * 2016-11-18 2017-05-31 天津大学 The generation of local test vector and optimization method based on ring oscillator network
CN106872876A (en) * 2017-01-25 2017-06-20 天津大学 Based on electromagnetism and the hardware Trojan horse side channel detection method for postponing
CN107798237A (en) * 2016-08-30 2018-03-13 航天信息股份有限公司 It is a kind of to determine to hide the method and system at back door in embedded system by side channel signal
CN108333498A (en) * 2018-01-10 2018-07-27 中国人民解放军国防科技大学 Non-maternal hardware Trojan horse detection method based on infrared chart side channel analysis
CN109299623A (en) * 2018-09-20 2019-02-01 天津大学 Hardware Trojan horse self-reference detection method based on clock frequency sweep
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan horse detection method based on path delay fingerprint
CN110348254A (en) * 2019-07-03 2019-10-18 北京工业大学 A method of based on ring oscillator real-time monitoring FPGA hardware wooden horse
WO2021261532A1 (en) * 2020-06-25 2021-12-30 東芝情報システム株式会社 Hardware trojan detection method, hardware trojan detection device, and program for hardware trojan detection

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120278893A1 (en) * 2011-03-23 2012-11-01 Vinayaka Jyothi Ring oscillator based design-for-trust
CN103488941A (en) * 2013-09-18 2014-01-01 工业和信息化部电子第五研究所 Hardware Trojan horse detection method and hardware Trojan horse detection system
CN103698687A (en) * 2013-12-18 2014-04-02 工业和信息化部电子第五研究所 Method and system for processing signals of hardware Trojan detection in integrated circuit
EP2731033A1 (en) * 2012-11-07 2014-05-14 Deutsche Telekom AG Construction method for resilient ICs
CN104239616A (en) * 2014-09-02 2014-12-24 工业和信息化部电子第五研究所 Design method of integrated circuit and hardware trojan detection method
CN104330721A (en) * 2014-10-29 2015-02-04 工业和信息化部电子第五研究所 Integrated circuit hardware Trojan horse detection method and integrated circuit hardware Trojan horse detection system
CN104615949A (en) * 2015-03-02 2015-05-13 中国电子科技集团公司第五十八研究所 Circuit designing method for improving hardware Trojan detecting resolution based on power supply isolation and hardware Trojan detecting method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120278893A1 (en) * 2011-03-23 2012-11-01 Vinayaka Jyothi Ring oscillator based design-for-trust
EP2731033A1 (en) * 2012-11-07 2014-05-14 Deutsche Telekom AG Construction method for resilient ICs
CN103488941A (en) * 2013-09-18 2014-01-01 工业和信息化部电子第五研究所 Hardware Trojan horse detection method and hardware Trojan horse detection system
CN103698687A (en) * 2013-12-18 2014-04-02 工业和信息化部电子第五研究所 Method and system for processing signals of hardware Trojan detection in integrated circuit
CN104239616A (en) * 2014-09-02 2014-12-24 工业和信息化部电子第五研究所 Design method of integrated circuit and hardware trojan detection method
CN104330721A (en) * 2014-10-29 2015-02-04 工业和信息化部电子第五研究所 Integrated circuit hardware Trojan horse detection method and integrated circuit hardware Trojan horse detection system
CN104615949A (en) * 2015-03-02 2015-05-13 中国电子科技集团公司第五十八研究所 Circuit designing method for improving hardware Trojan detecting resolution based on power supply isolation and hardware Trojan detecting method

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105807204B (en) * 2016-03-08 2018-07-27 天津大学 Hardware Trojan horse detection method based on frequency spectrum refinement
CN105807204A (en) * 2016-03-08 2016-07-27 天津大学 Spectrum refinement-based hardware Trojan detection method
CN107798237A (en) * 2016-08-30 2018-03-13 航天信息股份有限公司 It is a kind of to determine to hide the method and system at back door in embedded system by side channel signal
CN106771960A (en) * 2016-11-18 2017-05-31 天津大学 The generation of local test vector and optimization method based on ring oscillator network
CN106872876B (en) * 2017-01-25 2019-05-14 天津大学 Hardware Trojan horse side channel detection method based on electromagnetism and delay
CN106872876A (en) * 2017-01-25 2017-06-20 天津大学 Based on electromagnetism and the hardware Trojan horse side channel detection method for postponing
CN108333498A (en) * 2018-01-10 2018-07-27 中国人民解放军国防科技大学 Non-maternal hardware Trojan horse detection method based on infrared chart side channel analysis
CN109299623A (en) * 2018-09-20 2019-02-01 天津大学 Hardware Trojan horse self-reference detection method based on clock frequency sweep
CN109299623B (en) * 2018-09-20 2022-01-11 天津大学 Hardware Trojan self-reference detection method based on clock frequency sweep
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan horse detection method based on path delay fingerprint
CN109657464B (en) * 2018-10-29 2021-07-02 西安电子科技大学 Hardware Trojan horse detection method based on path delay analysis
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN110348254A (en) * 2019-07-03 2019-10-18 北京工业大学 A method of based on ring oscillator real-time monitoring FPGA hardware wooden horse
WO2021261532A1 (en) * 2020-06-25 2021-12-30 東芝情報システム株式会社 Hardware trojan detection method, hardware trojan detection device, and program for hardware trojan detection
JP2022007202A (en) * 2020-06-25 2022-01-13 東芝情報システム株式会社 Hardware trojan detection method, hardware trojan detection device and program for hardware trojan detection
JP7410476B2 (en) 2020-06-25 2024-01-10 東芝情報システム株式会社 Hardware trojan detection method, hardware trojan detection device, and hardware trojan detection program

Also Published As

Publication number Publication date
CN104950246B (en) 2017-09-19

Similar Documents

Publication Publication Date Title
CN104950246A (en) Hardware trojan detection method and system based on time delay
CN103698687B (en) In integrated circuit hardware Trojan horse detection signal processing method and system
CN103488941B (en) Hardware Trojan horse detection method and system
US5099196A (en) On-chip integrated circuit speed selection
CN110414277B (en) Gate-level hardware Trojan horse detection method based on multi-feature parameters
CN106291324B (en) A kind of on piece differential delay measuring system and recycling integrated circuit recognition methods
CN104330721A (en) Integrated circuit hardware Trojan horse detection method and integrated circuit hardware Trojan horse detection system
US7039572B1 (en) Method of analyzing electromagnetic interference
CN103926522B (en) The method and system of hardware Trojan horse detection and location is carried out based on voltage
CN104951698A (en) Circuit security testable design method capable of detecting inactive hardware Trojan horse and detecting method of hardware Trojan horse
CN104950248B (en) The circuit safety design for Measurability method and the detection method to hardware Trojan horse of accelerating hardware wooden horse triggering
CN103944655B (en) Noise recognizing method in power line carrier communication malfunction detection system
CN104101828B (en) Anti- hardware Trojan horse circuit design method based on activation probability analysis
KR20170015169A (en) An apparatus and method for detecting a resonant frequency giving rise to an impedance peak in a power delivery network
CN106297893A (en) The clock circuit of memorizer measuring circuit and method for designing thereof
CN104237768A (en) Integrated circuit hardware Trojan horse detection method and system
CN110988652B (en) Recovered chip detection method
CN104950247A (en) Method and system for detecting hardware trojan based on current of multiple power supplies
US9837170B2 (en) Systems and methods for testing performance of memory modules
CN110135161B (en) Hardware trojan on-chip detection method
US7617431B2 (en) Method and apparatus for analyzing delay defect
US11482992B2 (en) Clock sweeping system
CN107085179B (en) It is a kind of based on tightness evaluation analog circuit fault detection in test and excitation generation method
CN206818857U (en) A kind of voltage sensor detection means in safety chip
Morghade et al. Design of fast vedic multiplier with fault diagnostic capabilities

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant