Font Size: a A A

Research On Hardware Trojan Detection Method Based On Transition Probability Analysis

Posted on:2020-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:K FangFull Text:PDF
GTID:2428330578459434Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
With the globalization of semiconductor design and manufacturing processes,the design phase of integrated circuits and their manufacturing phases have been separated from each other.In order to shorten the design time of integrated circuits and reduce manufacturing costs,most chip companies usually use third-party EDA tools,cite third-party IP cores,and deliver the chips to third-party foundries for manufacturing.This provides an excellent opportunity for these untrusted "third parties" and even competitors to maliciously attack and destroy the chips.Hardware Trojan usually refer to redundant circuits with malicious functions embedded in the original circuit,which can tamper with or destroy the parameters or normal functions of the carrier circuit,resulting in serious consequences such as circuit function changes,sensitive information leakage or denial of service.Once Hardware Trojan is triggered,it will pose a serious threat to defense security,financial security,information and communication.Therefore,in order to ensure the safety of integrated circuit applications,how to quickly,accurately and efficiently implement Hardware Trojan detection,protection and security assessment is particularly important.In order to improve the detection probability of Hardware trojan,this paper proposes a method of the detection of Hardware trojan based on the insertion of 2-1 MUX.Increasing the nodes' transition probability by inserting 2-1 MUX is intended to increase the activation probability of Hardware trojan.By calculating the transition probability of all circuit nodes,then sets threshold of transition probability(TPth),and choose the circuit nodes below the TPth as the insertion object of a 2-1 MUX.The experimental results on the ISCAS85 circuit show that the scheme has a simpler circuit structure and has less power and area overhead in the case of almost the same Trojan activation probability compared with the existing method of inserting the dsff structure and POSC structure.For logic circuits,the probability that the main input logic value of the circuit is "0" and "1" is assumed to be a statistical probability of 0.5.Then we can calculate the transition probability of all nodes in the circuit according to the topology of the circuit.Because Hardware Trojan is usually inserted by attackers at nodes with low conversion probabilities,the transition probabilities of some nodes of the original circuit will change when the hardware Trojan is inserted into the circuit.Based on this principle,this paper proposes a Hardware Trojan detection method based on transition probability analysis.By comparing the transition probabilities of the circuit nodes before and after the insertion of the Hardware Trojan,we can accurately detect and locate the hardware Trojan.
Keywords/Search Tags:Hardware trojan, 2-to-1 MUX, Transition probability, Trojan activation, Logic test method
PDF Full Text Request
Related items