CN111027057B - Method and device for detecting hidden hardware of chip and storage medium - Google Patents

Method and device for detecting hidden hardware of chip and storage medium Download PDF

Info

Publication number
CN111027057B
CN111027057B CN201910099141.6A CN201910099141A CN111027057B CN 111027057 B CN111027057 B CN 111027057B CN 201910099141 A CN201910099141 A CN 201910099141A CN 111027057 B CN111027057 B CN 111027057B
Authority
CN
China
Prior art keywords
chip
scanning
soc
state
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910099141.6A
Other languages
Chinese (zh)
Other versions
CN111027057A (en
Inventor
桑胜田
黄显澍
肖新光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Antiy Technology Group Co Ltd
Original Assignee
Antiy Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Antiy Technology Group Co Ltd filed Critical Antiy Technology Group Co Ltd
Priority to CN201910099141.6A priority Critical patent/CN111027057B/en
Publication of CN111027057A publication Critical patent/CN111027057A/en
Application granted granted Critical
Publication of CN111027057B publication Critical patent/CN111027057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)
  • Tests Of Electronic Circuits (AREA)

Abstract

The embodiment of the invention discloses a method and a device for detecting hidden hardware of a chip and a storage medium, which relate to the technical field of chip safety and can effectively judge whether the hidden hardware exists in the chip. The method comprises the following steps: setting scan-related configuration parameters, including: address range of scanning, operation type of scanning; scanning the address space of the tested SoC based on the configuration parameters; capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value; capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.

Description

Method and device for detecting hidden hardware of chip and storage medium
Technical Field
The present invention relates to the field of chip security technologies, and in particular, to a method and apparatus for detecting hidden hardware of a chip, and a storage medium.
Background
With the development of microelectronic technology, the number of transistors on a single chip of an integrated circuit has been billions or more, and the chip functions and logic complexity are also very high. For chips with certain scale and complexity, the workload of designing, verifying and manufacturing is often finished by cooperation of multiple companies at the upstream and downstream of the whole industry. From an information security perspective, integrated circuit chips may be tampered with maliciously, for example, by implanting malicious logic circuits to alter circuit functions under certain subtle conditions, or to reveal information under certain triggering conditions, at various links of design and manufacture. As a highly complex system, malicious logic has high concealment, and detection and recognition are very difficult.
Disclosure of Invention
In view of this, the embodiments of the present invention provide a method, an apparatus, and a storage medium for detecting hidden hardware of a chip, which perform a large-scale scan operation on an address space of a SoC under test, and further observe an internal state and an external state of the SoC, so as to finally and effectively determine whether hardware hidden logic exists.
In a first aspect, an embodiment of the present invention provides a method for detecting hidden hardware of a chip, including:
setting scan-related configuration parameters, including: address range of scanning, operation type of scanning;
scanning the address space of the tested SoC based on the configuration parameters;
capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value;
capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
According to a specific implementation manner of the embodiment of the invention, the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation.
According to a specific implementation manner of the embodiment of the present invention, the scan operation is performed on the address space of the SoC under test based on the configuration parameters, specifically: and performing fuzzy test operation on the address space of the tested SoC based on the configuration parameters.
In a second aspect, an embodiment of the present invention provides a device for detecting hardware hidden in a chip, including:
the configuration generating module is used for setting configuration parameters related to scanning, and comprises the following steps: address range of scanning, operation type of scanning;
the upper computer control module is deployed on the upper computer and is used for loading configuration parameters to the bus operation execution module;
the bus operation execution module is positioned inside the tested SoC and is used for carrying out scanning operation on the address space of the tested SoC based on the configuration parameters;
the internal state capturing and analyzing module is used for capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value;
the external state capturing and analyzing module is used for capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
According to a specific implementation manner of the embodiment of the invention, the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation.
According to a specific implementation manner of the embodiment of the invention, the bus operation execution module is specifically a tested SoC processor and an embedded software module thereon.
According to a specific implementation manner of the embodiment of the present invention, the internal state capture analysis module is an embedded software module on the SoC processor under test, and is configured to perform a local analysis operation on an internal state in the SoC under test.
According to a specific implementation manner of the embodiment of the invention, the bus operation execution module is specifically a bus master device controlled by JTAG.
According to a specific implementation manner of the embodiment of the present invention, the internal state capturing and analyzing module is a software module running on an upper computer, and is configured to perform internal state analysis operation according to original captured data returned by the bus operation executing module; wherein the raw captured data comprises: the internal states captured by the operational process and the Fuzzing process.
In a third aspect, embodiments of the present invention also provide a computer-readable storage medium storing one or more programs executable by one or more processors to implement the method of any of the preceding implementations.
According to the method, the device and the storage medium for detecting the hidden hardware of the chip, provided by the embodiment of the invention, the address space of the tested SoC is scanned based on the configuration parameters, and the internal state and the external state of the chip in the scanning process are captured, so that whether the hidden hardware exists in the current chip or not is comprehensively analyzed and judged. The embodiment of the invention can avoid data leakage possibly caused by using an unsafe chip, and even avoid other more serious consequences.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an address bus and various device modules thereon according to the present invention;
FIG. 2 is a flowchart of an embodiment of a method for detecting hidden hardware of a chip according to the present invention;
FIG. 3 is a schematic diagram of an embodiment 1 of a device for detecting hidden hardware of a chip according to the present invention;
FIG. 4 is a schematic diagram of an embodiment 2 of a device for detecting hidden hardware of a chip according to the present invention;
fig. 5 is a schematic structural diagram of an embodiment 3 of a detection device with hardware hidden in a chip according to the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
There is often a large reserved area in the chip processor memory address space. The system will not access the address space during normal operation. These reserved address spaces are hidden from view and the user cannot learn about the address space or what functional logic is present. These hidden spaces may have embedded Trojan logical access portals that implement a prefetch or attack behavior in some cases outside of the normal functioning of the system.
In terms of hardware, as shown in fig. 1, each device module connected on the bus decodes the bus address of a certain section, and enables its chip select signal when the read-write address hits its range on the bus; if the hidden malicious logic hardware of the system is connected to the bus, the address of a certain section is decoded, and when the address hits the range of the bus, the chip selection signal is enabled, so that the function of the functional module is activated. Therefore, when the scan hits in the hidden logical address range, the result is different from the result of the common reserved address during read-write, and the power consumption or the chip heat change may be caused by activating the additional hardware circuit. These internal and external state characteristic changes can be used as clues to discover hidden logic. Based on this, the present invention proposes the following embodiments for efficiently identifying and discovering hidden hardware logic of a chip.
In a first aspect, an embodiment of the present invention provides a method for detecting hidden hardware of a chip, which can effectively determine whether hidden hardware exists in the chip.
Fig. 2 is a flowchart of an embodiment of a method for detecting hidden hardware of a chip according to the present invention, including:
s101: setting configuration parameters related to scanning; the configuration parameters include, but are not limited to: address range of scan, operation type of scan.
Wherein, the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation. More specifically, the write operation also requires determining the data content of the write operation, and the read-write combination operation also requires determining the pattern in which the operations are repeated and alternately combined.
S102: and scanning the address space of the tested SoC based on the configuration parameters.
More preferably, the scan operation is performed on the address space of the SoC under test based on the configuration parameters, specifically: and performing fuzzy test operation on the address space of the tested SoC based on the configuration parameters.
Step S102 may be performed by the SoC processor under test and the embedded software thereon, or may be performed by a bus master device controlled by JTAG.
S103: and capturing and analyzing the internal state of the tested SoC in the scanning process. The internal states include: the hardware resource access status of the system environment, and the associated variable values or register values. Wherein the relevant variable value refers to a variable involved in the interaction with hardware; the register value refers to an internal register resource of the SoC, and is used for completing the functions of configuration, communication, data exchange and the like of an application layer and hardware resources.
The step S103 may be implemented by embedded software on the SoC processor to be tested or software on an upper computer.
S104: and capturing and analyzing the external state of the tested SoC in the scanning process. The external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
According to the embodiment, the internal state and the external state of the tested SoC chip are obtained in real time by performing a large-scale scanning operation on the tested SoC, and whether the hardware Trojan exists in the current chip or not is finally judged based on the internal state and the external state, so that serious consequences such as data leakage possibly caused by using the chip with the abnormality are avoided.
In a second aspect, an embodiment of the present invention provides a device for detecting hidden hardware of a chip, which can effectively determine whether the hidden hardware exists in the chip.
Fig. 3 is a schematic structural diagram of an embodiment 1 of a detection device for hiding hardware of a chip according to the present invention, where the device of the embodiment may include:
the configuration generating module 301 is configured to set scan-related configuration parameters, including: address range of scan, operation type of scan. Wherein, the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation.
The upper computer control module 302 is disposed on the upper computer and is configured to load configuration parameters into the bus operation execution module 303;
the bus operation execution module 303 is located inside the SoC to be tested, and is configured to perform a scan operation on an address space of the SoC to be tested based on the configuration parameters;
the internal state capturing and analyzing module 304 is configured to capture and analyze an internal state of the SoC under test during the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value;
the external state capturing and analyzing module 305 is configured to capture and analyze an external state of the SoC under test during the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
According to the embodiment, the internal state and the external state of the tested SoC are obtained in real time by performing a large-scale scanning operation on the tested SoC, and the hardware Trojan of the chip is finally detected based on the internal state and the external state, so that serious consequences such as data leakage possibly caused by using the chip with abnormality are avoided.
Fig. 4 is a schematic structural diagram of an embodiment 2 of a detection device with hardware hidden in a chip, which is applicable to a situation that an on-chip processor is controllable and a scanning operation does not interfere with execution of the processor, where the device of the embodiment may include:
the configuration generating module is used for setting configuration parameters related to scanning, and comprises the following steps: address range of scan, operation type of scan. Wherein, the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation.
The upper computer control module is deployed on the upper computer and is used for loading configuration parameters to the bus operation execution module. The upper computer control module is also used for loading the configuration parameters, the test execution program and the software program of the internal state capture analysis module into the tested SoC processor.
The bus operation execution module is a tested SoC processor and an embedded software module on the tested SoC processor and is used for carrying out scanning operation on an address space of the tested SoC based on configuration parameters. The bus operation execution module is used as a master device on the bus and can initiate read-write operation on any address space on the bus.
The internal state capturing and analyzing module is an embedded software module on the tested SoC processor and is used for capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access status of the system environment, and the associated variable values or register values.
The external state capturing and analyzing module is used for capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
The embodiment is suitable for the condition that the on-chip processor is controllable and the scanning operation does not interfere with the execution of the processor. In the embodiment, the SoC processor to be tested and the embedded software module on the SoC processor to be tested are used for executing scanning operation and capturing and analyzing of the internal state, and meanwhile, the external state capturing and analyzing module is used for capturing and analyzing the external state. Finally, judging whether hidden hardware exists in the tested SoC according to the analysis results of the internal state and the external state.
Fig. 5 is a schematic structural diagram of an embodiment 3 of a detection device for hiding hardware of a chip, which is suitable for a situation that a processor on the chip is unavailable or a scan test process affects a normal execution program of the processor, the device of the embodiment may include:
the configuration generating module is used for setting configuration parameters related to scanning, and comprises the following steps: address range of scanning, operation type of scanning; the operation types of the scanning include: a read operation, a write operation, or a read-write combination operation.
The upper computer control module is deployed on the upper computer and is used for loading configuration parameters to the bus operation execution module;
the bus operation execution module is positioned inside the tested SoC, specifically is a JTAG controlled bus master device and is used for carrying out scanning operation on the address space of the tested SoC based on the configuration parameters; the bus operation execution module is used as a master device on the bus and has the capability of initiating read-write operation on any address space on the bus, can perform the read-write operation according to the configuration parameters issued by the upper computer control module, and returns the original captured data in the scanning operation process to the upper computer control module.
The internal state capturing and analyzing module is in particular a software module running on the upper computer and is used for carrying out internal state analyzing operation according to the original captured data returned by the bus operation executing module; the internal states include: the hardware resource access state of the system environment and the related variable value or register value; wherein the raw captured data comprises: the internal states captured by the operational process and the Fuzzing process.
The external state capturing and analyzing module is used for capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption, or the chip thermal characteristics.
This embodiment is applicable in cases where the on-chip processor is not controllable, or where the scanning operation may interfere with the processor execution. In the embodiment, the DAP controller controlled by the JTAG test interface on the tested SoC specifically executes the scan test operation, and feeds back the data of the internal state change in the scan test to the upper computer, and the internal state capture analysis module located on the upper computer performs the analysis operation of the internal state data, and simultaneously, the external state capture analysis module realizes the capture and analysis of the external state. Finally, judging whether hidden hardware exists in the tested SoC according to the analysis results of the internal state and the external state.
In a third aspect, embodiments of the present invention also provide a computer-readable storage medium storing one or more programs executable by one or more processors to implement the method of any of the preceding implementations.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments.
In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments in part.
For convenience of description, the above apparatus is described as being functionally divided into various units/modules, respectively. Of course, the functions of the various elements/modules may be implemented in the same piece or pieces of software and/or hardware when implementing the present invention.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (9)

1. The method for detecting the hidden hardware of the chip is characterized by comprising the following steps of:
setting scan-related configuration parameters, including: address range of scanning, operation type of scanning;
scanning the address space of the tested SoC based on the configuration parameters;
capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value; the related variable value refers to a variable involved in the interaction with hardware;
capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption or the chip thermal characteristics;
the scan operation is performed on the address space of the SoC to be tested based on the configuration parameters, specifically: and performing fuzzy test operation on the address space of the tested SoC based on the configuration parameters.
2. The method of detection of claim 1, wherein the type of operation of the scanning comprises: a read operation, a write operation, or a read-write combination operation.
3. A chip hidden hardware detection device, comprising:
the configuration generating module is used for setting configuration parameters related to scanning, and comprises the following steps: address range of scanning, operation type of scanning;
the upper computer control module is deployed on the upper computer and is used for loading configuration parameters to the bus operation execution module;
the bus operation execution module is positioned inside the tested SoC and is used for carrying out scanning operation on the address space of the tested SoC based on the configuration parameters;
the internal state capturing and analyzing module is used for capturing and analyzing the internal state of the tested SoC in the scanning process; the internal states include: the hardware resource access state of the system environment and the related variable value or register value;
the external state capturing and analyzing module is used for capturing and analyzing the external state of the tested SoC in the scanning process; the external state includes: the state of the chip output signal, the chip power consumption or the chip thermal characteristics;
the bus operation execution module scans the address space of the tested SoC based on the configuration parameters, and specifically comprises the following steps: and performing fuzzy test operation on the address space of the tested SoC based on the configuration parameters.
4. A detection apparatus according to claim 3, wherein the type of operation of the scanning comprises: a read operation, a write operation, or a read-write combination operation.
5. The test device of claim 3, wherein the bus operation execution module is embodied as a SoC processor under test and an embedded software module thereon.
6. The detection apparatus of claim 5, wherein the internal state capture analysis module is an embedded software module on a SoC processor under test for performing local analysis operations on internal states within the SoC under test.
7. The test apparatus of claim 3, wherein the bus operation execution module is embodied as a JTAG-controlled bus master.
8. The detecting device according to claim 7, wherein the internal state capturing and analyzing module is a software module running on a host computer, and is configured to perform an internal state analyzing operation according to the original captured data returned by the bus operation executing module; wherein the raw captured data comprises: the internal states captured by the operational process and the Fuzzing process.
9. A computer readable storage medium storing one or more programs executable by one or more processors to implement the method of any preceding claim.
CN201910099141.6A 2019-01-31 2019-01-31 Method and device for detecting hidden hardware of chip and storage medium Active CN111027057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910099141.6A CN111027057B (en) 2019-01-31 2019-01-31 Method and device for detecting hidden hardware of chip and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910099141.6A CN111027057B (en) 2019-01-31 2019-01-31 Method and device for detecting hidden hardware of chip and storage medium

Publications (2)

Publication Number Publication Date
CN111027057A CN111027057A (en) 2020-04-17
CN111027057B true CN111027057B (en) 2023-12-26

Family

ID=70203453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910099141.6A Active CN111027057B (en) 2019-01-31 2019-01-31 Method and device for detecting hidden hardware of chip and storage medium

Country Status (1)

Country Link
CN (1) CN111027057B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685241A (en) * 2021-01-27 2021-04-20 中国科学院微电子研究所 Multi-granularity memory detection method, memory device and electronic device

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101984575A (en) * 2010-10-14 2011-03-09 中兴通讯股份有限公司 Method and device for protecting mobile terminal software
DE102011113305A1 (en) * 2010-09-27 2012-03-29 Samsung Electro Mechanics Co., Ltd. Boundary scan test device for embedded substrate, has test controller that controls test chip to perform boundary scan test at semiconductor chip embedded into embedded substrate
CN102663185A (en) * 2012-04-06 2012-09-12 北京大学 Hardware Trojan-resisting circuit design method based on blurring processing
CN104504336A (en) * 2014-12-30 2015-04-08 大连楼兰科技股份有限公司 Method and device for preventing embedded system from being maliciously debugged online
CN104866766A (en) * 2015-06-05 2015-08-26 中国电子科技集团公司第五十八研究所 Detection method aiming at CPU internal hidden instruction type hardware trojan
CN107533433A (en) * 2015-04-16 2018-01-02 时间防御***有限责任公司 System and method for the Autonomous test of rear making external hardware annex
CN107843828A (en) * 2017-10-26 2018-03-27 电子科技大学 A kind of digital circuit boundary scan control system based on FPGA
CN108387838A (en) * 2018-03-07 2018-08-10 天津芯海创科技有限公司 The method of chip detecting method, device, chip and design chips
CN108446555A (en) * 2018-02-11 2018-08-24 复旦大学 The method that hardware Trojan horse is monitored in real time and is detected
CN108737211A (en) * 2018-05-16 2018-11-02 武汉微创光电股份有限公司 A kind of method and device of detection PHY chip port status variation
CN108846283A (en) * 2018-06-15 2018-11-20 北京航空航天大学 A kind of hardware Trojan horse real-time detecting system and its design method
CN108985058A (en) * 2018-06-28 2018-12-11 中国人民解放军国防科技大学 Hardware Trojan horse detection method based on infrared image detail enhancement
CN109145334A (en) * 2017-06-27 2019-01-04 深圳市中兴微电子技术有限公司 A kind of method and device of chip design treatment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9509707B2 (en) * 2014-06-24 2016-11-29 Qualcomm Incorporated Methods and systems for thwarting side channel attacks
US10317463B2 (en) * 2015-10-27 2019-06-11 Nvidia Corporation Scan system interface (SSI) module

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011113305A1 (en) * 2010-09-27 2012-03-29 Samsung Electro Mechanics Co., Ltd. Boundary scan test device for embedded substrate, has test controller that controls test chip to perform boundary scan test at semiconductor chip embedded into embedded substrate
CN101984575A (en) * 2010-10-14 2011-03-09 中兴通讯股份有限公司 Method and device for protecting mobile terminal software
CN102663185A (en) * 2012-04-06 2012-09-12 北京大学 Hardware Trojan-resisting circuit design method based on blurring processing
CN104504336A (en) * 2014-12-30 2015-04-08 大连楼兰科技股份有限公司 Method and device for preventing embedded system from being maliciously debugged online
CN107533433A (en) * 2015-04-16 2018-01-02 时间防御***有限责任公司 System and method for the Autonomous test of rear making external hardware annex
CN104866766A (en) * 2015-06-05 2015-08-26 中国电子科技集团公司第五十八研究所 Detection method aiming at CPU internal hidden instruction type hardware trojan
CN109145334A (en) * 2017-06-27 2019-01-04 深圳市中兴微电子技术有限公司 A kind of method and device of chip design treatment
CN107843828A (en) * 2017-10-26 2018-03-27 电子科技大学 A kind of digital circuit boundary scan control system based on FPGA
CN108446555A (en) * 2018-02-11 2018-08-24 复旦大学 The method that hardware Trojan horse is monitored in real time and is detected
CN108387838A (en) * 2018-03-07 2018-08-10 天津芯海创科技有限公司 The method of chip detecting method, device, chip and design chips
CN108737211A (en) * 2018-05-16 2018-11-02 武汉微创光电股份有限公司 A kind of method and device of detection PHY chip port status variation
CN108846283A (en) * 2018-06-15 2018-11-20 北京航空航天大学 A kind of hardware Trojan horse real-time detecting system and its design method
CN108985058A (en) * 2018-06-28 2018-12-11 中国人民解放军国防科技大学 Hardware Trojan horse detection method based on infrared image detail enhancement

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
hardware Trojan Attacks: Threat Analysis and Countermeasures;Swarup Bhunia 等;Proceedings of IEEE;第102卷(第8期);1229-1247 *
Letitia W.Li 等.Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics.ACSAC'15: Proceedings of the 31st Annual Computer Security Applications Conference.2015,461-470. *
一种CPU芯片硬件验证调试平台的设计与实现;李文,王恒才,唐志敏;计算机研究与发展(06) *
基于CPLD的PLC背板总线协议接口芯片设计;谭爱国;琚长江;;自动化与仪表(01);53-56 *
基于扫描链的可编程片上调试***;陈华军;娄卓阳;王焕东;刘慧;王琳;;高技术通讯(第06期);584-592 *
硬件木马防护技术研究;王侃;陈浩;管旭光;顾勇;;网络与信息安全学报(09);1-12 *
车用微控制器的模糊逻辑与BDM部件研究与设计;曾娟丽;中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑(第06期);C035-71 *

Also Published As

Publication number Publication date
CN111027057A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
US8104001B2 (en) Automated debugging method for over-constrained circuit verification environment
US20160078146A1 (en) Analyzing structure of web application
US11144648B2 (en) Trojan insertion tool
CN105631341B (en) Blind detection method and device for vulnerability
Del Grosso et al. Improving network applications security: a new heuristic to generate stress testing data
US9594617B2 (en) Method and apparatus for positioning crash
US6925405B2 (en) Adaptive test program generation
US10069855B1 (en) Automated security analysis of software libraries
US8707231B2 (en) Method and system for derived layer checking for semiconductor device design
JP2019505871A (en) Method and apparatus for verifying supply chain of electronic device using side channel information in code analysis
CN103699837B (en) A kind of method of scanning file and terminal unit
CN111027057B (en) Method and device for detecting hidden hardware of chip and storage medium
US7065789B1 (en) System and method for increasing heuristics suspicion levels in analyzed computer code
Calvagna et al. Combinatorial interaction testing of a Java Card static verifier
CN106648911B (en) Key jitter removal method and device
TW201935331A (en) Task running method and apparatus, and electronic device
Yust et al. Structural checking: Detecting malicious logic without a golden reference
CN111143851B (en) Detection method and system suitable for kernel object address leakage of operating system
JP2022175297A (en) Sample generation device, sample generation method and sample generating program
CN112685241A (en) Multi-granularity memory detection method, memory device and electronic device
Ayalasomayajula et al. Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs
WO2024154288A1 (en) Program analysis device, program analysis method, and non-transitory computer-readable medium
Behnam Validation of Hardware Security and Trust: A Survey
CN112165499B (en) Control flow monitoring method and device and storage medium
Antunes et al. Security testing in SOAs: Techniques and tools

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Heilongjiang Province (No. 838, Shikun Road)

Applicant after: Antan Technology Group Co.,Ltd.

Address before: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Heilongjiang Province (No. 838, Shikun Road)

Applicant before: Harbin Antian Science and Technology Group Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant