Font Size: a A A

The Study Of Hardware Trojan Detection Based On Trigger Efficiency Improvement

Posted on:2016-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2308330461476558Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Hardware Trojan is the malicious circuit that makes integrated circuit disclose confidential information or invalid under specific condition. Because of the feature of design and manufacture, the untrusted IP cores, EDA tools, library or manufacturing in untrusted foundry all can make it very easy to embed hardware Trojan in integrated circuit. On the other hand, the application of integrated circuit involves in many important fields such as national security, communication, finance et al. It will cause disastrous consequences if any integrated circuit embedded with hardware Trojan applied in this field, so it is very important to keep the integrated circuit from the damage of hardware Trojan.To solve this problem, the study about how to quickly and effectively detect the digital hardware Trojan embedded during manufacture is conducted. This paper first analyzes the trigger model of hardware Trojan and finds out that the occurrence probability of rare logic value and low controllability of inner nodes are the key factors that restrict hardware Trojan triggered. Based on this, this paper then proposes a triggering method that can magnify the activity of Hardware Trojan:using the intrinsic scan chain divides the sequential logic circuit into combinational logic blocks bounded by the scan chain and IO ports to improve the controllability; optimizing the candidate vectors generated by ATPG to improve the occurrence probability of rare logic value. Based on this triggering method, this paper designs a method that detect hardware Trojan using logic test approach and side-channel approach simultaneously. At last, this paper verifies the effect of triggering and detecting hardware Trojan with simulation.Simulation results show:(1) The experiment of logical test-based approach reveals that this triggering method can trigger more hardware Trojans in less time, as compared to the most widely used ATPG Method, and the advantage will increase as the stealth of the Trojans increases. (2) In the experiment of side-channel analysis-based approaches, the feature of hardware Trojan can be clearly identified, the triggering method can increase the sensitivity of Trojan detection by magnifying the impact of a Trojan circuit on a power signature.
Keywords/Search Tags:Hardware Trojan detection, Scan chain, Test vector generation, Logic testapproach, Side-channel analysis approach
PDF Full Text Request
Related items