Font Size: a A A

Research On Hardware Trojan Detection Technology Based On Circuit Characteristics Analysis

Posted on:2019-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:S H YangFull Text:PDF
GTID:2348330563454349Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
With the gradual improvement of systematic solutions of software security issues,hardware security issues have gradually become an urgent problem in the field of system security and information security.In order to ensure the security of key areas such as national defense,finance and transportation,many researchers have been keeping on hardware Trojan,and hardware security issues have gradually become a major concern of the country and society.In the view of characteristics of the circuit,this thesis studies the hardware Trojan detection method.And it mainly completes the following work:1.By analyzing the SDFF structure and MFTD structure,proposed an improved insertion structure,which is called AND-AND&OR-OR structure.In the circuit,there are some nodes with low transition probability,this paper designed this improved structure to solve this problem.The new structure consumes less area and fewer ports,which can reduce the design complexity.The results of the UART reference circuit show that the turnover probability of the low activity node in the design is increased by about 512 times,which can effectively shorten the activation time of the Trojan horse.2.According to input and output characteristics of the DCVSL structure,designed an insertion structure.When one of the input of the inverter based on DCVSL is always in a logic high state,an output has inverse relationship with the other input.With this property,it's possible to controllably change the transition probability of nodes with a polarization output of 1.For the nodes with polarization output of 0,an ordinary inverter could be added.3.Completed of layout drawing and library file extraction of DCVSL structural units.In the design of this thesis,we need to insert the elements of DCVSL structure into the circuit composed of standard cells,and verify the correctness of the design through simulation.Therefore,we need to build the DCVSL structure library file for synthesis and simulation.This article use IC615,Abstract generator,Encounter Library Characterizer and other tools to complete the layout of the DCVSL structure unit,LEF and lib library construction.4.By analyzing of the input and output characteristics of the circuit,combined with the method of verifying the equivalence of the circuit,the Trojan horse detection method based on probability signature is verified.When the input signals of a Boolean function satisfies the probability distribution in the text,the probability distribution of its output response is unique.The input and output relations of the circuit can also be represented by Boolean functions.The Boolean functions of different circuits are also different.Based on this feature,its applicability in the detection of hardware Trojan horses was studied.
Keywords/Search Tags:Trojan Detection, AND-AND&OR-OR, DCVSL, Transition Probabilities, Probabilistic Signature
PDF Full Text Request
Related items