Font Size: a A A

IP Soft Core Design And Hardware Trojan Detection Based On AES Encryption Algorithm

Posted on:2019-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:Q D LiFull Text:PDF
GTID:2428330578468409Subject:Agriculture
Abstract/Summary:PDF Full Text Request
With the rapid development of integrated circuits and IP(Intellectual Property)cores,network security incidents are also emerging.Some networks Hacker use IP core design flaws,system backdoors,and security loopholes to implement hardware Trojans in programs.Attack,and then change the circuit's function,which makes the security of the chip and hardware equipment has been a great threat,especially the password chip,the attacker can implant malicious hardware logic in the chip,and then obtain the user's key information Use keys to steal more valuable information.Based on this,128-bit AES encryption algorithm is selected as the carrier of hardware Trojans.Hardware Trojans are embedded in IP soft cores compiled with Verilog language.Hardware Trojans IP core design and verification are completed in Quartus ? software.Because the hardware Trojan has concealment and the difficulty of detection is high,this paper carries out hardware Trojan detection from the source IP core of the chip design.In the pre-processing process,the hardware Trojan horse feature library and the verification of the functional integrity analysis are established by loading and unloading the hardware Trojans in the IP soft core,and for the Trojan detection process,a kind of verification is established.The coarse-grained Trojan horse detection model and scheme based on the information flow graph,through the use of the call relationship of each module as a weight value,search for suspicious modules and initially locate the hardware Trojan horse.In addition,a combination of code coverage,signal toggle rate,signal and clock delay,running power consumption,and layout segmentation was proposed to detect the hardware Trojan's fine-grained detection scheme.The performance of the hardware Trojan was compared before and after loading.Out of the anomaly and feature differences,thereby more accurately locate the location of the hardware Trojan.Finally,a software platform capable of detecting hardware Trojans was developed to facilitate the visualization of test results.
Keywords/Search Tags:IP core, hardware Trojan, AES, Quartus ?, information flow diagram
PDF Full Text Request
Related items