Font Size: a A A

Research On The Technology Of Hardware Trojans Generation Based On Obfuscation

Posted on:2015-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:W F FengFull Text:PDF
GTID:2308330473451543Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of integrated circuits, chip design and manufacturing process are more and more complicated, semiconductor manufacturing process have gradually globalization. Due to the limitation of development costs and design cycle, more chip companies using third-party EDA tools or IP cores, or transfer the part of the chip manufacturing process to third- party, this is a potential threat to the chip security. Hardware Trojan is one of threat and it has become the concern focus of the chip security area, in recent years.Currently, the research about hardware Trojan has attracted wide attention, hardware Trojan detection has been studied and multiple detection methods have proposed by many scholars, however, the design and processed of Hardware Trojans were relatively few. In this paper, by drawing on the obfuscation design idea of hardware protection, studying a hardware Trojan generating method based on obfuscation design, to increase the difficult of functional verification and logic test detection.In this paper, for the characteristics of the design and detection of hardware Trojans, studying and realizing a hardware Trojan generation method based on obfuscation process. Using the logic obfuscation to process hardware Trojan,delaying the activation of hardware Trojan load, so as to reduce the probability the Trojan activation in logic detection, while it is necessary to limit the resource consumption and side-channel information, so as not to increase the efficiency of other detection methods.The main works as follow:(1) The understand and analysis about the structure and working principle of hardware Trojans, while proposed the basic method based on logic obfuscation design idea and constructed a circuit model of obfuscation process.(2) The study of hardware Trojans’ basic design method, for the specific target circuit, designing and implanting different functions of the Trojan circuits into it. The Trojan circuit functions are verified by simulation, and through the logic synthesis and physical implementation to extract relevant information.(3) It is necessary to analysis the structure and activation of Trojan circuit, so as to propose the obfuscation models which are suitable for Trojan circuit. According to the activation of hardware Trojans, constructing different obfuscation models. The method is studied which is the combination obfuscation and Trojan circuit, which need ensure that the function of original circuit and Trojan circuit will be not impact, so as to generate the low activation rate Hardware Trojans. And then the obfuscation models are applied to Trojan circuits, to verify the feasibility of obfuscation method. Last, the resource consumption and side-channel information are compared.(4) Study the feasibility of the proposed Trojan circuit obfuscation generation methods, applying the proposed method to benchmark circuits which were implanted hardware Trojan, the purpose is the verification and evaluation of the obfuscation process method.
Keywords/Search Tags:Hardware Trojans, AES algorithm, obfuscation design, effectiveness evaluation
PDF Full Text Request
Related items