Font Size: a A A

A Research On Hardware Trojan Design And Detection Method Of Different Triggered Features

Posted on:2020-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z F MaFull Text:PDF
GTID:2428330596975937Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
As an important part of modern data processing and transmission,the security of hardware circuit is a necessary condition to ensure information security.Hardware Trojan refers to malicious modification of the original circuit in the design or production of integrated circuits.As a form of attack on integrated circuits,it does great harm to information security.The information attack and defense of hardware Trojan is a new problem faced by integrated circuits.In order to explore the attack forms and characteristics of hardware Trojan on integrated circuits,and realize targeted detection and protection against malicious attacks,this paper carries out the research on the design and detection technology of hardware Trojan.In the aspect of hardware Trojan horse design,aiming at traditional hardware circuit,this paper takes OR1200 microprocessor as attack target circuit,builds attack platform,analyses the data path of the processor,selects specific data nodes,designs three kinds of hardware Trojan horses with different triggering characteristics,namely frequency threshold triggering Trojan horse,rare special sequence condition triggering Trojan horse and time threshold.Value condition triggered Trojan horse,three kinds of Trojan horse activation conditions are special working frequency range,special rare link instruction sequence,especial time slice.Experiments show that the designed Trojan horse can realize the attack on the processor's privilege bit.Frequency threshold Trojan horse and time threshold Trojan horse can not be detected by logical test in normal use scenarios;under special sequence Trojan horse,the probability of activation of test vectors is as low as(1/243)7,and all three Trojans have high concealment.In hardware Trojan detection technology,this paper firstly chooses different elements associated with circuit characteristics to establish simulation theory,and simulates and analyses different bypass quantities,and selects key bypass quantities to build detection platform.Experiments show that the designed hardware Trojan can be detected.This year,the application of AI technology has been deepening,which makes the security of AI system more and more concerned.On the other hand,in the design of hardware Trojan,this paper explores the hardware Trojan attack for the new special hardware system applied in the field of AI.There are differences between hardware Trojan attack of AI dedicated hardware system and traditional hardware Trojan attack,such as poor interpretability of data in hidden layer of neural network.In this paper,the deep convolution neural network is used as the attack target,and the deep convolution neural network is constructed.The special data processing circuit for the neural network is designed.The data processing process of the deep convolution neural network model is analyzed,and the attack framework for the neural network is constructed.Using attack framework and attack configuration algorithm,trigger feature Trojans for network parameters and mapping feature graph are designed respectively.The attack effect is verified on the dedicated hardware circuit.Experiments show that the triggering feature Trojan horse of network parameters changes the semantics segmentation surface inside the neural network,while the triggering feature Trojan horse of mapping feature graph transfers the intermediate data of samples from one region to another.Both attacks can realize the error recognition and classification of samples,and have high concealment.
Keywords/Search Tags:Hardware Trojan, Information Security, Processor, Artificial Intelligence, Hardware Trojan Detection
PDF Full Text Request
Related items