Font Size: a A A

Research Of Critical Techniques For Hardware Vulnerability Analysis Of Integrated Circuit

Posted on:2021-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2428330623468263Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the upgrading of integrated circuit(IC)process technology,integrated circuits are widely used in electronic components in various key areas.Therefore,the information security of integrated circuits has gradually attracted people's attention,and has become a key research direction in the related fields of integrated circuits.The hardware Trojan is the most common and effective attack method in integrated circuits,and its related research has attracted the attention of academia.Based on the above background,the vulnerability analysis methods of integrated circuits in the face of hardware Trojan threats is studied and analyzed in this thesis,and the related Trojan detection method and layout-based vulnerability analysis from the perspective of hardware Trojan detection and prevention are also studied.The main content of this thesis is as follows:(1)The development status of integrated circuit hardware Trojan detection and prevention is investigated in this thesis,and the knowledge of integrated circuit hardware Trojan is introduced,including circuit structure,trigger mode,and functions.At the same time,the existing hardware Trojan detection and prevention technologies are summarized,and their advantages and disadvantages are also illustrated.(2)vulnerability analysis method at integrated circuit layout level is studied:According to the principle of integrated circuit layout,the blank layout space and unused wire resources are analyzed that can be used to place standard cells in the layout to implant hardware Trojan,and corresponding index models are set up to evaluate vulnerability of each area to Trojan attacks.In addition,considering the hidden design of the hardware Trojan,the two factors of path delay and power are considered to further evaluate the vulnerability of the area to the special Trojan attack.Finally,the above analysis flow is performed on the layouts of the two test circuits to verify the usability.(3)The hardware Trojan detection based on the time characteristics of integrated circuit temperature field is studied:Based on the analysis of the integrated circuit temperature field,different side channel detection schemes are proposed.First,based on the circuit power model,the characteristic of the influence of hardware Trojan on the power and temperature of the original circuit is analyzed in this thesis,and the method of mapping the temperature difference to the arrived time difference to reduce the effects of noise and process variation is proposed.Then the circuit characteristic is extracted from the time data.Finally,different methods such as neural network are used to detect the infected chips.It can be known from the experimental results that the detection rate of the Trojan with small power can be more than 90%by using the neural network method,and the position of the hardware Trojan can be judged.However,as for the other detection method using LTPD to measure the temperature difference of Trojan horses,its detection rate of small Trojan horses is less than 90%[17].In addition,some extended experiments are set up to discuss the impact of infrared camera resolution and process variations in this article.
Keywords/Search Tags:Integrated Circuit, Hardware Trojan Detection and Prevention, Vulnerability Analysis, Temperature, Side-channel
PDF Full Text Request
Related items