Font Size: a A A

Hardware Trojan Detection Research Based On UVM

Posted on:2017-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:C Y ShiFull Text:PDF
GTID:2348330509960332Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
In the past few decades, the integrated circuit(IC) has penetrated into all areas of human activities, including in the areas relating to the lifeblood of the national finance, military, industry, and transportation which has also been widely used. Thus, ensuring the safety and reliability of the integrated circuit becomes particularly important. Hardware Trojan has drawn more and more researchers' attention because of its huge potential hazards. Researchers have done a lot of work on hardware Trojan detection, but there is still a lack of mature available detection methods and platforms in academia.This thesis details the hardware Trojan classification and various detection methods, and then focuses on the register transfer level(RTL) hardware Trojan detection. By studying the hardware Trojan activation probability theory and analysis the activation probability of hardware Trojans, a special structure dump scan flip-flop(DSFF) used for hardware Trojan detection and a hardware Trojan detection method based on rapid activation were proposed. At the same time, this thesis introduces the universal verification methodology(UVM). Based on UVM, a system-on-chip(SOC) test platform was set up with microprocessor OR1200. The microprocessor OR1200 is set as the golden reference model, ten different kinds of Trojans were inserted to OR1200, and then detecting them by using the proposed rapid activation method.The experimental results show that DSFF can effectively improve the node status with low inversion probability and activity of the entire circuit to help reduce hardware Trojans activation time. Besides, the results show that the hardware Trojan detection method based on rapid activation is effective but it will improve the hardware resource cost. Thus, we need a compromise between the affectivity and cost. Not only that, this method could play a certain degree of effect in the detection of hardware Trojans, but the method also has its own shortcomings, it cannot detect the whole kinds of hardware Trojans, and still need improvement.
Keywords/Search Tags:hardware Trojan, Trojan detection, UVM, Rapid Activation, OR1200
PDF Full Text Request
Related items