CN104951698B - The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected - Google Patents

The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected Download PDF

Info

Publication number
CN104951698B
CN104951698B CN201510355088.3A CN201510355088A CN104951698B CN 104951698 B CN104951698 B CN 104951698B CN 201510355088 A CN201510355088 A CN 201510355088A CN 104951698 B CN104951698 B CN 104951698B
Authority
CN
China
Prior art keywords
circuit
trojan horse
hardware trojan
security test
under
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510355088.3A
Other languages
Chinese (zh)
Other versions
CN104951698A (en
Inventor
于宗光
周昱
雷淑岚
王淑芬
张�荣
魏敬和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 58 Research Institute
Original Assignee
CETC 58 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 58 Research Institute filed Critical CETC 58 Research Institute
Priority to CN201510355088.3A priority Critical patent/CN104951698B/en
Publication of CN104951698A publication Critical patent/CN104951698A/en
Application granted granted Critical
Publication of CN104951698B publication Critical patent/CN104951698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware

Abstract

The circuit safety design for Measurability of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected the present invention relates to a kind of.Original circuit design and checking are completed first.Secondly it is circuit increase security test pattern, the clock frequency under the pattern is far smaller than circuit work frequency, and completes the design works such as corresponding comprehensive, placement-and-routing, Time-Series analysis.Then the safety in utilization test pattern during chip testing, by using security test clock of the frequency well below functional clock, to reduce dynamic power consumption during whole circuit operation, the ratio accounted in power consumption is consumed in whole circuit so as to improve quiescent dissipation caused by idle condition hardware Trojan horse, so as to realize to this kind of detection in dormant hardware Trojan horse.

Description

The circuit safety design for Measurability method of inactive hardware Trojan horse can be detected and to hardware The detection method of wooden horse
Technical field
The present invention relates to a kind of circuit safety design for Measurability method that can detect inactive hardware Trojan horse and to hardware wood The testing process of horse, it is especially a kind of by adding additional circuit so that hardware Trojan horse is easier quilt in circuit design stage The design method and testing process detected, it is especially suitable for the hardware Trojan horse of detection for a long time in a dormant state.
Background technology
As IC industry is towards the trend development of global cooperation, in IC industrial chain link, have more next More third parties participates in so that integrated circuit is more and more with factor uncontrolled in manufacturing process in design, thus triggers To the worry of Research on Integrated Circuit Security.Due to the participation of the uncontrolled link of third party, integrated circuit is in design and manufacturing process In be easy to by malicious modification, and be implanted hardware Trojan horse.The meeting that these hardware Trojan horses have changes the function of circuit, reduces electricity The performance on road, shortens the life-span of circuit, or even the confidential information inside the meeting leakage circuit having, so as to have a strong impact on integrated circuit And the security of the Informationization Equipment using the integrated circuit, such as Snowdon prism door event.
There is the research of the detection method of many hardware Trojan horses that is directed to and may contain in integrated circuit both at home and abroad at present. Most study is that detection technique based on bypass analysis and logic-based are tested in current hardware Trojan horse detection method Detection technique.Detection based on bypass analysis mainly utilizes bypass message during chip operation(Such as electromagnetic radiation, electric current or The information such as circuit delay)To be detected to hardware Trojan horse.Its principle is because the hardware Trojan horse being implanted into circuit can be to chip By-passing signal, such as electric current, frequency or path delay have an impact, thus by observe chip by-passing signal and with original core The bypass message of piece is made comparisons, and then detects the presence for whether having hardware Trojan horse in chip.The hardware wood of logic-based test Horse detects, and the method mainly tested by function and result, that is, produces various test vectors, by observe test to Whether the output of amount meets that desired value comes inside decision circuitry whether contain hardware Trojan horse.
Above-mentioned two classes method can detect, but be dependent on to certain a kind of specific hardware Trojan horse to a certain extent Hardware Trojan horse or hardware Trojan horse is needed to be constantly in working condition so as to influence circuit power consumption and frequency relation in needing to trigger, And the information such as path delay.But for hardware Trojan horse for a long time in a dormant state, above-mentioned two classes method is more difficult to be had The detection of effect.
The content of the invention
It is an object of the invention to overcome the deficiencies in the prior art, there is provided one kind can detect difficult flip-over type hardware wood The circuit safety design for Measurability method of horse, and the detection side to hardware Trojan horse according to the circuit safety design method Method.The technical solution adopted by the present invention is::
A kind of circuit safety design for Measurability method that can detect inactive hardware Trojan horse, comprises the following steps:
A) Functional Design and the checking of circuit, are completed;
B), according to certain rule, a clock frequency lower than ifq circuit working frequency is determined, is surveyed as security Clock frequency under die trial formula;
C), by configuring an internal register come the normal mode of operation of selection circuit or security test pattern, And to should be user invisible for the register address;
D) the circuit rear end design works such as synthesis, scan chain insertion, placement-and-routing, Time-Series analysis, are completed, ensure that circuit exists Timing closure under normal mode of operation and security test pattern;
E) vector of functional test, is used for security test pattern, ensures circuit under security test pattern, function Test vector can also pass through.
Further, step b) determines that the clock frequency of security test pattern has the rule of following several respects:
B1 reduced dynamic power consumption value), is wanted according to circuit and determines security test clock frequency;
B2), the ratio-dependent security test clock frequency accounted for according to raising quiescent dissipation is wanted in overall power;
B3), the minimum clock frequency determination for meeting to require along quality according to clock can be obtained;
B4), minimum clock frequency cannot be below the circuit determined by information such as the manufacturing process of circuit and logical paths most Small normal working frequency.
Further, according to the detection side to hardware Trojan horse of any one of above-mentioned circuit safety design for Measurability method Method, it is characterised in that comprise the steps:
F), under normal mode of operation and security test pattern, circuit work frequency is respectively adopted and than work frequency The low security test clock frequency of rate, identical test vector is inputted to circuit, recorded under both of which in certain section of time zone Interior transient current curve, and the transient power consumption curve obtained under both of which in certain section of time interval is calculated, and with this Datum curve as both of which;
G), the chip to be measured finished will be made, also according to above-mentioned steps (f) method, in normal mode of operation and security Under test pattern, input same test vector, the transient current curve under the both of which obtained in same time section is obtained, And the transient power consumption curve obtained under both of which in same time section is calculated, compared with datum curve, if measured curve And datum curve deviation is more than threshold value, then it is assumed that contains hardware Trojan horse in chip to be measured.
The technical effects of the invention are that:
Even if the hardware Trojan horse long-time being implanted inside circuit is in a dormant state or in the case of extremely difficult triggering, still So can effectively it be detected by the present invention.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the present invention in one embodiment.
Fig. 2 is to have wooden horse and without wooden horse circuit in same test excitation, same time section under function testing mode Transient power consumption curve synoptic diagram.
Fig. 3 is to have wooden horse and without wooden horse circuit in same test excitation, same time section under security test pattern Interior transient power consumption curve synoptic diagram.
Embodiment
With reference to specific drawings and examples, the invention will be further described.
Design for Measurability(DFT, Design for Testability)It is in integrated circuit design very important one Ring, it whether there is manufacturing defect in the fabrication process mainly for detection of chip, so as to have influence on the function of circuit, and finished product Rate.And it is developed a variety of DFT techniques and carrys out the defects of more effective detection chip manufacture.But for integrated electricity It whether there is the safety detection of hardware Trojan horse in road, still neither one is general as DFT at present, normal process.And work as Preceding technology such as logic testing detected for hardware Trojan horse and bypass analysis detection etc., all rely on such a premise bar Part, i.e., the hardware Trojan horse triggering or in running order in circuit.But there is a kind of hardware Trojan horse not influence function, also not shadow Circuit performance is rung, usually in sleep state, only can just be activated under the operation of special software instruction, for this type Hardware Trojan horse, still detected at present without preferable method.
The present invention is directed to the above situation, proposes a kind of similar DFT safe design for Measurability(DFST, Design for Security Testability)Method, and how inactive type hardware wood is carried out using the circuit of safe design for Measurability The detection method of horse.
The present invention is further illustrated with reference to the accompanying drawings and examples
Hardware Trojan horse detection technique based on bypass analysis is the hardware Trojan horse detection technique of current most study, and its is main Principle is that integrated circuit is distorted by malice, and after being implanted hardware Trojan horse, the structure of circuit is changed, circuit logic scale Increase is reduced, therefore the electric current of circuit, and phase can also occur for the bypass such as path delay and maximum operation frequency parameter The change answered.Detected by curent change inside circuit with the presence or absence of the technology of hardware Trojan horse, have a supposed premise, i.e., The work as much as possible of wooden horse circuit energy is needed, can just detect that the change of electric current comes.Among the composition of electric current, dynamic current Most ratios are accounted for, but are not worked for a long time for some, for dormant circuit, it is difficult to detect dynamic current Change come, even if the scale of hardware Trojan horse circuit is quite big.
The power consumption of circuit can be expressed by equation below:
P=(1/2)﹒ C ﹒ VDD 2 ﹒ f ﹒ N+Ileak﹒ VDD
VDDFor supply voltage, C is node loading capacitance, IleakFor quiescent current;As voltage VDDOne timing, influences power consumption Principal element is exactly f and N.F is exactly the frequency of circuit work, and N is exactly the upset rate of circuit internal node.When hardware Trojan horse is long Between do not work no dynamic current when producing, by the dynamic power consumption for reducing other circuit modules, it is possible to significantly improve wooden horse The proportion that quiescent dissipation caused by circuit is occupied in total power consumption, so as to be detected.Reduce dynamic power consumption method from Intuitively can apparently there are very much two methods in formula:First, reduce the frequency of circuit work;Second, reduce turning over for circuit node Rate of rotation.The present invention is exactly in circuit design process, a kind of can examined by increasing in the clock frequency far below normal work When surveying long-term sluggish hardware Trojan horse, the ratio of circuit dynamic power consumption is greatly reduced, significantly improves inactive hardware Trojan horse Quiescent dissipation ratio shared in overall power, so as to which whether content has hardware Trojan horse inside discrimination circuit.
Fig. 1 is a kind of implementation steps of circuit safety design for Measurability method of the present invention.According to step S100 It is described, complete the design and functional verification of ifq circuit.
Secondly according to described in step S101, according to described in content b), circuit safety is determined according to rule in the present invention Clock frequency under test pattern.In the present embodiment, checking circuit employs the ALU that a scale is 300 Circuit, work clock step are set to 100MHz, and the technology library used is SMIC 0.13um.Under circuit safety test pattern Clock frequency be set to 1MHz, i.e., target reduces 100 times of dynamic power consumption.
According to described in step S102, completing the synthesis under SMIC 0.13um, the work such as scan chain insertion and placement-and-routing Make.Due to the extra clock input pin of no addition, but using register come control function test pattern(The present invention's It is equal to normal mode of operation during functional test)With security test pattern.Thus while circuit will support two patterns(In work Operation mode and security test pattern), but placement-and-routing is later, and the design redundancy of circuit almost can be ignored.
According to described in step S103, after circuit completes placement-and-routing, complete in functional test and security test, Enable same test vector all normal work under above two pattern.
According to described in step S104, by carrying out HSPICE emulation to circuit, circuit is recorded in same test vector Under excitation, and in same time section, the transient current curve under both of which, according to electric current, supply voltage relation, so that it may Conversion obtains the transient power consumption curve in certain section of time interval under both of which, and bent in this, as the benchmark of both of which Line.
Finally as described in S105, when chip manufacturing finishes, when being tested, in mode of operation and security test pattern Under, encouraged with identical test vector, record chip and the transient current curve in circuit simulation same time section, conversion Obtain transient power consumption curve;When the transient power consumption curve measured is compared with the transient power consumption curve of emulation, change greatly, beyond threshold During value, then it is assumed that hardware Trojan horse be present in chip to be measured.
The determination of this threshold value, can be by repeatedly measuring, and experience in test determined in the past.
A preliminary checking, the arithmetical logic list that scale used in this embodiment is about 300 have been done in this example In member, and about 13% hardware Trojan horse is implanted into, working frequency and security test clock frequency are respectively 100MHz and 1MHz.Fig. 2 It is under 100MHz frequencies, there is wooden horse circuit and the difference without wooden horse circuit on power consumption profile.Can be very clear from Fig. 2 Clear finds out, under 100MHz frequencies, two power consumption profiles essentially coincide, and cannot be distinguished by circuit whether there is wooden horse.Fig. 3 is in 1MHz Under clock frequency, there is the difference on the transient power consumption curve of the circuit of wooden horse and the circuit without wooden horse.
As can be drawn from Figure 3, for trojan horse detection the normal working frequency of clock frequency ratio it is small must be more, then detect Effect is better.But one skilled in the art will appreciate that circuit is required for meeting timing closure in the design process.If same electricity There is the working frequency of two kinds of hundreds times or even thousand times ten thousand times of differences on road, then slower working frequency is directed to, in order to meet in circuit The requirement for prolonging quality to clock side of portion's register, may dramatically increase requirement of the circuit to clock quality, and increase design is multiple Miscellaneous degree a, it is therefore desirable to equalization point is found between security test frequency and design complexities.

Claims (2)

  1. A kind of 1. circuit safety design for Measurability method that can detect inactive hardware Trojan horse, it is characterised in that including following step Suddenly:
    A) Functional Design and the checking of circuit, are completed;
    B), according to certain rule, a clock frequency lower than ifq circuit working frequency is determined, as security test mould Clock frequency under formula;
    C), by configuring an internal register come the normal mode of operation of selection circuit or security test pattern, and should It is invisible that register address should be user;
    D) circuit rear end design work, is completed, ensures that sequential of the circuit under normal mode of operation and security test pattern is received Hold back;
    E) vector of functional test, is used for security test pattern, ensures circuit under security test pattern, functional test Vector can also pass through;
    F), under normal mode of operation and security test pattern, circuit work frequency and lower than working frequency is respectively adopted Security test clock frequency, identical test vector is inputted to the circuit of design, recorded under both of which in certain time Transient current curve in section, and the transient power consumption curve obtained under both of which in certain section of time interval is calculated, and with This datum curve as both of which;
    G), the chip to be measured finished will be made, also according to above-mentioned steps (f) method, in normal mode of operation and security test Under pattern, input same test vector, the transient current curve under the both of which obtained in same time section is obtained, and count The transient power consumption curve obtained under both of which in same time section is calculated, compared with datum curve, if measured curve and base Directrix curve deviation is more than threshold value, then it is assumed that contains hardware Trojan horse in chip to be measured.
  2. 2. the circuit safety design for Measurability method as claimed in claim 1 that can detect inactive hardware Trojan horse, its feature exist In:
    Step b) determines that the clock frequency of security test pattern has the rule of following several respects:
    B1 reduced dynamic power consumption value), is wanted according to circuit and determines security test clock frequency;
    B2), the ratio-dependent security test clock frequency accounted for according to raising quiescent dissipation is wanted in overall power;
    B3), the minimum clock frequency determination for meeting to require along quality according to clock can be obtained;
    B4), minimum clock frequency cannot be below circuit minimum normal working frequency.
CN201510355088.3A 2015-06-24 2015-06-24 The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected Active CN104951698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510355088.3A CN104951698B (en) 2015-06-24 2015-06-24 The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510355088.3A CN104951698B (en) 2015-06-24 2015-06-24 The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected

Publications (2)

Publication Number Publication Date
CN104951698A CN104951698A (en) 2015-09-30
CN104951698B true CN104951698B (en) 2018-03-02

Family

ID=54166348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510355088.3A Active CN104951698B (en) 2015-06-24 2015-06-24 The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected

Country Status (1)

Country Link
CN (1) CN104951698B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11068590B2 (en) 2017-08-02 2021-07-20 Enigmatos Ltd. System and processes for detecting malicious hardware
CN109684881B (en) * 2017-10-19 2021-02-12 中国科学院微电子研究所 Bypass detection method and device
CN108629187B (en) * 2018-05-03 2021-08-17 电子科技大学 On-chip multiprocessor safety evaluation method
CN109657464B (en) * 2018-10-29 2021-07-02 西安电子科技大学 Hardware Trojan horse detection method based on path delay analysis
CN109711204B (en) * 2018-10-29 2021-02-26 西安电子科技大学 Hardware Trojan horse detection method based on path delay fingerprints
CN110059504B (en) * 2019-03-01 2021-02-26 西安电子科技大学 Hardware Trojan horse detection method and device
CN112904992A (en) * 2021-01-28 2021-06-04 珠海奔图电子有限公司 Image forming apparatus and control method thereof
CN112906345B (en) * 2021-03-30 2022-10-04 天津飞腾信息技术有限公司 Method, system, and medium for validating paths in logic circuits

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592068A (en) * 2011-09-05 2012-07-18 工业和信息化部电子第五研究所 Method for detecting malicious circuit in FPGA (field programmable gate array) chip by power consumption analysis and system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9081991B2 (en) * 2011-03-23 2015-07-14 Polytechnic Institute Of New York University Ring oscillator based design-for-trust

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592068A (en) * 2011-09-05 2012-07-18 工业和信息化部电子第五研究所 Method for detecting malicious circuit in FPGA (field programmable gate array) chip by power consumption analysis and system thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《一种基于区域划分的硬件木马功耗显化方法》;李海燕;《第十八届计算机工程与工艺年会暨第四届微处理器技术论坛》;20140731;第277-281页 *

Also Published As

Publication number Publication date
CN104951698A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN104951698B (en) The circuit safety design for Measurability method of inactive hardware Trojan horse and the detection method to hardware Trojan horse can be detected
CN104950248B (en) The circuit safety design for Measurability method and the detection method to hardware Trojan horse of accelerating hardware wooden horse triggering
CN111027270B (en) Method and circuit for trusted design of integrated circuit design flow
CN102262212B (en) System for detecting trigger single particle effect in digital application specific integrated circuit
CN106291324B (en) A kind of on piece differential delay measuring system and recycling integrated circuit recognition methods
CN104950246B (en) Hardware Trojan horse detection method and system based on delay
CN110988652B (en) Recovered chip detection method
KR20190121701A (en) Latch circuitry for memory applications
Yu et al. An improved automatic hardware trojan generation platform
CN104101828A (en) Hardware-Trojan-resisting circuit design method based on activation probability analysis
CN101216532A (en) Method for reducing scanning power consumption in sequence circuit
CN108681669A (en) A kind of hardware Trojan horse detection system and method based on multi-parameter side Multiple Channel Analysis
US6564360B2 (en) Static timing analysis method for a circuit using generated clock
CN106601643B (en) Measurement method, the device and system of the MOS process corner of chip
CN109446708A (en) A method of checking clock path
CN102663185A (en) Hardware Trojan-resisting circuit design method based on blurring processing
CN104636687B (en) Improve the circuit design method and hardware Trojan horse detection method of hardware Trojan horse detection resolution
CN102831934A (en) Method for entering into internal test mode of ASRAM chip
US20160188772A1 (en) Method of designing an integrated circuit and computing system for designing an integrated circuit
CN106649959A (en) Scan chain-based circuit design method and hardware Trojan detection method
CN109711204A (en) Hardware Trojan horse detection method based on path delay fingerprint
CN102831927B (en) Circuit capable of entering into internal test mode of ASRAM chip
CN104849648B (en) A kind of test vector generating method for improving wooden horse activity
Giridharan et al. A MUX based Latch Technique for the detection of HardwareTrojan using Path Delay Analysis
Mondal et al. XOR based methodology to detect hardware trojan utilizing the transition probability

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant