CN108062477A - Hardware Trojan horse detection method based on side Multiple Channel Analysis - Google Patents

Hardware Trojan horse detection method based on side Multiple Channel Analysis Download PDF

Info

Publication number
CN108062477A
CN108062477A CN201711322625.XA CN201711322625A CN108062477A CN 108062477 A CN108062477 A CN 108062477A CN 201711322625 A CN201711322625 A CN 201711322625A CN 108062477 A CN108062477 A CN 108062477A
Authority
CN
China
Prior art keywords
detection
data
trojan horse
hardware trojan
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711322625.XA
Other languages
Chinese (zh)
Inventor
张磊
董有恒
王建新
肖超恩
高献伟
赵成
殷梦婕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Original Assignee
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE filed Critical BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority to CN201711322625.XA priority Critical patent/CN108062477A/en
Publication of CN108062477A publication Critical patent/CN108062477A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to chip secure fields, and in particular to a kind of hardware Trojan horse detection method based on side Multiple Channel Analysis, including:Establish chip side channel signal acquisition testing platform;To the side channel data collected, dimension-reduction treatment is carried out using based on principal component analytical method, to reduce data volume and extract effective information;Selection detection algorithm analyzes data, draws testing result.The present invention is by building chip side channel signal acquisition platform, selection detection algorithm is detected hardware Trojan horse, hardware Trojan horse detection can be realized according to prompting input relevant parameter in user, data need not be manually imported or knock in the code of detection algorithm, trojan horse detection can be realized, improve detection efficiency and accuracy, simultaneously, it can be achieved that the detection of Many Detection, can also need to be extended algorithm according to user.

Description

Hardware Trojan horse detection method based on side Multiple Channel Analysis
Technical field
The invention belongs to the hardware Trojan horse detection fields of chip secure, and in particular to a kind of hardware based on side Multiple Channel Analysis Trojan detecting method.
Background technology
Electronic technology develops rapidly, and the scale of IC designs is increasing, and complexity is also higher and higher.As semiconductor designs The division of labor with manufacture further refines, more and more IC enterprises depend on Chevron Research Company (CRC) and manufacturing works, with reduce product into This.Meanwhile the multiplexing of third party's IP kernel, design and test outsourcing, eda tool such as generally use to bring peace to IC designs at the factors Full hidden danger causes to be likely to be implanted hardware Trojan horse in the whole life cycle of IC designs.
Belong to a part for the safe chips safety of system for the research of hardware Trojan horse, start late, two Pius XIs It records and just enters the visual field of people.2007, the first public concept for proposing hardware Trojan horse circuit in IBM research centers, i.e. hardware Wooden horse refer to hardware chip from R & D design, manufacture to malice circuit in the whole life cycle of packaging and testing implantation or Ifq circuit is distorted.Hardware Trojan horse is either to ASICs, COTS component, microprocessor, microcontroller, network processes The hardware modifications of device or DSP etc. or to the modification of firmware, such as FPGA bit streams.Hardware Trojan horse is to realize malicious act Circuit, it can specifically triggering activation condition under realize destroy sexual function or leakage chip internal secret information.As it can be seen that Hardware Trojan horse just refers to be present in an independent chip, there may also be in hardware system, eventually by hardware entities Realize the malice circuit of vicious function.
Since the harmfulness of hardware Trojan horse is huge, the security threat that chip faces has caused the height weight of security fields Depending on researcher has also carried out substantial amounts of research.But many hardware Trojan horses at this stage detect detection without concise and unified Platform, many hardware Trojan horse detection methods are required for researcher to knock in the code of detection algorithm manually by manually importing data It realizes, efficiency is low, poor reliability.
The content of the invention
It is an object of the invention to provide a kind of hardware Trojan horse detection method based on side channel information and expansible, Developable detection platform and user interface pass through gathered data-data prediction-data analysis-and draw a conclusion four Step carries out hardware Trojan horse detection.Many algorithms can be achieved in the invention, and user not only can as needed carry out detection algorithm Selection, can also add algorithm on the basis of the present invention as needed.
The present invention provides a kind of hardware Trojan horse detection method based on side Multiple Channel Analysis, including:
Establishment side channel signal acquisition testing platform;
To the side channel data collected, dimension-reduction treatment is carried out based on principal component analytical method, to reduce data volume and carry Take effective information;
Detection algorithm is selected to carry out hardware Trojan horse detection, by data analysis, draws testing result.
Further, detection platform includes host computer, detection object, DC power supply and oscillograph, and the detection object is adopted With FPGA minimum system plates;
DC power supply is connected with the FPGA minimum systems plate, is provided working power for minimum system plate, and is visited for electromagnetism Head provides amplification power supply;
FPGA minimum system plates communicate with host computer, for downloading program from host computer, so as to which minimum system plate be controlled to transport Row;
The data of the FPGA minimum system plates collected are converted into digital signal by oscillograph by analog signal, and by number Signal transmission is stored to host computer.
Further, detection algorithm is selected, which to carry out hardware Trojan horse detection, to be included:
Hardware Trojan horse detection based on distance and the hardware Trojan horse detection based on machine learning.
Further, the algorithm based on distance includes mahalanobis distance or Euclidean distance.By calculating chip to be measured and template Chip (determines without wooden horse, and realizes the chip of identical function) distance between data to judge whether contain hardware in chip to be measured Wooden horse.User can adjust detection sensitivity according to the fabrication error of chip in interaction page.
Further, detection algorithm is selected to carry out hardware Trojan horse detection to further include:Based on decision tree or random forests algorithm Carry out hardware Trojan horse detection.Both detection methods are, it is necessary to instruct machine learning algorithm model by a certain amount of data Practice, chip to be measured is sorted out according to trained result, so as to judge whether it contains hardware Trojan horse.
Compared with prior art the beneficial effects of the invention are as follows:By building chip side channel signal acquisition testing platform, Chip side channel data are obtained, including electromagnetic data and power consumption data.User can be according to prompting input data storage path and phase Related parameter can carry out the importing of side channel data, and can carry out hardware Trojan horse detection, after the completion of detection, user with selection algorithm Interface may also display the result figure of this detection and accuracy rate statistics, improve detection efficiency, meanwhile, the present invention provides four kinds Detection algorithm, user can also as needed be extended algorithm.
Description of the drawings
Fig. 1 is the flow chart of the hardware Trojan horse detection method the present invention is based on side Multiple Channel Analysis;
Fig. 2 is the structure diagram of detection platform in the hardware Trojan horse detection method the present invention is based on side Multiple Channel Analysis;
Fig. 3 is flow chart of the one embodiment of the invention based on distance detection hardware Trojan horse;
Fig. 4 is flow chart of the one embodiment of the invention based on machine learning detection hardware Trojan horse;
Fig. 5 is that the present invention is based on the user interface sectional drawings of distance detection hardware Trojan horse software;
Fig. 6 is the distance of chip to be measured and template chip and without wooden horse chip and template chip in one embodiment of the invention Distance versus figure;
Fig. 7 is the distribution map of accuracy in detection in one embodiment of the invention;
Fig. 8 is detection structure prompting figure in one embodiment of the invention;
Fig. 9 is the structure chart of decision tree in one embodiment of the invention;
Figure 10 is the classification accuracy relation that the detection based on random forest grader provides in one embodiment of the invention Butut.
Specific embodiment
The present invention is described in detail for shown each embodiment below in conjunction with the accompanying drawings, but it should explanation, these Embodiment is not limitation of the present invention, those of ordinary skill in the art according to these embodiment institute work energy, method, Or equivalent transformation or replacement in structure, all belong to the scope of protection of the present invention within.
As shown in Figure 1, present embodiments provide a kind of hardware Trojan horse detection method based on side channel information, detecting step Including:Data acquisition-data prediction-data analysis-is drawn a conclusion.It specifically includes:
Chip electromagnetic leakage signal acquisition testing platform is built first, and master then is utilized to the acquired electromagnetic data collected Constituent analysis (PCA, Principal Component Analysis) method dimensionality reduction (data acquisition and pretreatment), to reduce number It according to measuring and extracting effective information, can need to make choice detection algorithm according to user, and judge whether contain in chip to be measured There is hardware Trojan horse (data analysis is drawn a conclusion).
This method is described in detail below.
1st, hardware Trojan horse writes insertion and program is downloaded
Hardware Trojan horse is write using Verilog language, is inserted into the aes algorithm that can normally run, from And achieve the purpose that reveal key.And emulation testing, the realization of verification algorithm and the reality of hardware Trojan horse function are carried out to program It is existing.
2nd, operation and data acquisition
Normal aes algorithm code is downloaded in FPGA and is run, gathering FPGA by side channel signal acquisition platform lets out The power consumption data or electromagnetic data of dew, and stored as template data.
Aes algorithm code inserted with hardware Trojan horse is downloaded in FPGA and is run, utilizes identical method acquisition chip Side channel data, and store as chip data to be measured.
The acquisition of power consumption data is generally acquired using the detection platform built, and detection platform can be divided into host computer, inspection Survey four object (FPGA minimum systems version), DC power supply, oscillograph parts.As shown in Figure 2.
Host computer is responsible for downloading code into FPGA minimum system plates, and FPGA minimum systems version can be normal as detection object Downloaded encrypted code is performed, DC power supply provides working power for minimum system plate, and oscillograph believes the simulation collected It number is converted to digital signal and is transferred to host computer and store.
At work, power loss signal is can not be measured directly for minimum system plate, due to its operating voltage be it is constant, because This its power loss signal can be reflected indirectly by electric current, so during acquisition, only need size of current on acquisition chip ground wire i.e. Can, but since oscillograph can only collection voltages signal, it is therefore desirable to a resistance of connecting on ground wire is converted to current signal Voltage signal, the voltage signal finally gathered just can indirectly reflect the power consumption track of chip current events.The electricity of chip simultaneously Magnetic signal is also can not be measured directly, and the electromagnetic signal given off during chip operation is exceptionally weak, it is necessary to utilize tool The electromagnetic probe for having enlarging function is detected, and electromagnetic probe is the circular coil of N circles, can electromagnetic signal be converted into voltage Signal, and the voltage signal can be amplified by amplifying circuit, and be transmitted in oscillograph.
3rd, data prediction
More accurate as a result, the sampling precision set may be higher in order to obtain, this results in gathered power consumption data Data volume is very big, and each data has a points up to ten thousand, and the data used have thousands of, therefore for speed up processing, Reduce data volume, it is necessary to which the data collected are pre-processed.
Principal component analysis (PCA, Principal Component Analysis) be exactly by data by higher dimensional space with Covariance is up to principle and is mapped to lower dimensional space, so as to reduce data volume.It can be effective using PCA (principal component analysis) While data volume is reduced, retain the information of legacy data to greatest extent, while there is certain filter action.
4th, data processing and result judgement
According to the side channel data of new film, we establish two kinds of side channel data models altogether:
Power consumption model:It=I (f, k)+Ipv+Ie+Iht(f,k);
Electromagnetic model:Sght=S (f, r, k)+Spv+Se+Sht(f,r,k);
The side channel signal that wherein I and S is revealed when being worked normally by chip, f are working frequency of chip, and k is in chip The algorithm of operation, r are the distance apart from chip.IpvWith SpvThe intrinsic noise revealed by chip, IeWith SeFor gathered data when The noise collected, IhtWith ShtThe side channel data revealed by hardware Trojan horse, and both data are normal chips is not had Have, we are exactly to judge whether chip to be measured contains hardware Trojan horse by this point difference.
There are many algorithms for the judgement and classification of data, we mainly have studied the hardware Trojan horse detection based on distance, And the hardware Trojan horse detection based on machine learning.
Hardware Trojan horse detection based on distance, mainly by calculating chip side channel data to be measured and template chip side channel The distance of data, distance can be mahalanobis distance, Euclidean distance etc., according to template chip data spacing from size judge Whether chip contains hardware Trojan horse.Shown in its testing principle and flow chart 3.
Hardware Trojan horse detection based on machine learning, mainly by classification of the machine learning model realization to data, and most Wooden horse chip has been splitted data into eventually and without two class of wooden horse chip.The lead-in portion side channel data first into model, and to this A little data set correctly mark, and mark may indicate that whether the data contain hardware Trojan horse, and the Data Identification if any wooden horse is " 1 ", the Data Identification of no wooden horse is " 0 ", and machine learning model is trained using these tool tagged data, so as to To the model detected for hardware Trojan horse, which can realize testing data accurately classification, schematic diagram and inspection Flow gauge is as shown in Figure 4.
It should be noted that in the present invention, PCA technologies have been used for data prediction, other dimensionality reductions can also be used Algorithm replace the data preprocessing method.For data analysis, the present invention provides four kinds of parsers, be respectively Euclidean away from From, mahalanobis distance, decision tree and random forest, and in other examples, a lot of other algorithms is used equally for data analysis, such as Neural network algorithm, support vector machines etc..
Hardware Trojan horse detection method provided by the invention based on side channel information, using the method for side Multiple Channel Analysis, profit Dimension-reduction treatment is carried out to data on the premise of side channel signal integrality is not influenced with the data preprocessing method of PCA, then It can judge whether chip has been implanted wooden horse by different algorithms, have the following technical effect that:
1) solution framework of the hardware Trojan horse detection based on side channel information is provided, each step in the frame can be into Row extension.Such as this step of data analysis, user to data can handle using other algorithms according to actual needs etc..
2) data collection architecture is devised, essentially all of side channel information acquisition is using frame provided by the invention Frame is further designed and extended.
5th, user interface explanation.
5.1 interface purposes
This software is divided into the GUI design environments of Matlab R2014a and counted into, has been packaged into executable file, can Depart from Matlab operations.The software is mainly used for obtaining side channel data (such as power consumption, electromagnetism of chip to be measured and template chip Deng) after, it is analyzed using different algorithm offside channel datas, so as to whether judge in chip to be measured containing hardware wood Horse.
5.2 interface function.
1) side channel data imports
The software can import the data collected according to data storage path input by user, meanwhile, user can root Data precision and required data volume according to acquisition set the data sampling to be imported points (dimension) and sampling bar number.
2) Data Dimensionality Reduction
PCA dimensionality reductions are carried out to the data after importing, the data volume of processing is reduced, while improves the signal-to-noise ratio of data.
3) detection algorithm selects
Four kinds of detection methods are provided in software, are Euclidean distance respectively, mahalanobis distance, decision tree classifier and random Forest classified device, user can make choice as needed.
4) accuracy of detection is set
For the accuracy of detection mainly for the detection based on Euclidean distance and mahalanobis distance, this can be neglected in using other methods when Function.User can need to be adjusted when the detection of above two method is carried out when using the software according to specific experiment, examine It is higher to survey the smaller then detection sensitivity of precision.
5) testing result is shown
When carrying out the detection based on mahalanobis distance and Euclidean distance, user can as needed to different testing results into Row display can show the distance Curve of chip to be measured and template chip chamber, the distance of no wooden horse chip and template chip chamber respectively Curve, comparison diagram (not shown) based on above-mentioned two distance Curves and the result figure after being made the difference to two curves (are not shown Go out), while the accuracy of this detection can be provided;Can be shown when detected based on decision tree generation decision tree and The concrete outcome of detection;It can show that decision tree number is distributed with classification accuracy relation when carrying out the detection based on random forest Figure (not shown) and specific testing result.
5.3 software performance
1) input parameter
The data that user can carry out .txt file types according to the side channel data path of prompting input storage import, and can It needs to be configured the item number for importing data according to test, i.e. how many energy marks or electromagnetic signal track, general one .txt file deposits a data, while user can set the points of each data to tie up according to the sampling number of oscillograph Degree, so as to fulfill the importing of free routing and arbitrary data amount.
2) data processing time
According to the size for importing data volume, the time that data import will be different, and the number of data of importing is more, institute It is also longer with the time.
The time of progress PCA dimensionality reductions is also related with data volume size, and data are more, and the time used in PCA dimensionality reductions is longer.
Data processing is carried out using various algorithms and shows that the time of result is extremely short, therefore is importing data, carries out PCA drops After dimension operation, it can conveniently switch different detection algorithms and draw the testing result of respective algorithms quickly.
In conclusion the time of the data processing of the software is concentrated mainly on the data predictions such as data importing and dimensionality reduction Part, and carry out the later stage data processing and the results show efficiency it is very high.
3) Rapid reset
It after once experiment has been carried out, such as to import different data and detect again, without restarting software, software is provided with fast Fast reset button can immediately begin to new detection after need to only clicking on.The presence of reset button simultaneously can also avoid losing because of operation Running software malfunctions caused by by mistake.
5.4 software interface introductions
Hardware Trojan horse inspection software interface is broadly divided into four parts:
1. data prediction part
Mainly complete the functions such as side channel data importing and Data Dimensionality Reduction in the part.It can be according to the side number of channel input by user It is imported according to file path and filename, and PCA dimensionality reductions is carried out to the data of importing, the data dimension after dimensionality reduction is made to be down to most It is low, and at least retain the information of initial data 96%.
2. detection algorithm selects and precision setting part
Mainly complete the selection of detection algorithm and the setting of geneva and Euclidean distance accuracy of detection in the part.Wherein examine Method of determining and calculating includes:Mahalanobis distance, Euclidean distance, decision tree classifier and random forest grader;Geneva and Euclidean distance inspection The numerical value of survey precision setting is smaller, and detection sensitivity is higher, but accuracy needs user to weigh.
3. processing mode selected section
It is detected mainly for the hardware Trojan horse based on mahalanobis distance and Euclidean distance the part.User can select as needed The mode of processing data is selected so as to generate required result figure and detection information.Click on the beginning detection button of the part Last processing carries out data with the selection according to user, and shows result.
4. testing result display portion
Mainly to mahalanobis distance, the handling result of Euclidean distance and random forest grader is patterned top half It has been shown that, predominantly graph and distribution map.The latter half mainly shows the detection of decision tree classifier and random forest grader Information, information including classifier training and carries out accuracy of hardware Trojan horse differentiation etc. after being trained.
Attached drawing 5 is seen at the interface of hardware Trojan horse inspection software.
5.5 running environment
1) hardware environment
In order to shorten taking for processing data as far as possible, processor should reach Intel Core i3 processors and its more than water It is flat.
2) software environment
Operating system is Windows 7 and its above version, can be in installation Matlab R2014a and its more than version The MCR compilers of respective version are run or installed in system.
3) data environment
Should there be the side channel data of template chip (no wooden horse chip) and chip to be measured in the PC machine of running software, and And preserved with .txt file formats, Data Filename is necessary for following form:Filename+space+number (is used for which is represented Data) .txt, can be generally configured in host computer gathered data, at the same import every time data file requirement number and Filename before space must be identical, and should be stored under identical file folder.
5.6 are illustrated using step
To collect and be stored in F:Under 6_8dc files exemplified by the electromagnetic data of chip.Chip uses Altera Cyclone IV E minimum systems plate is core, downloads standard AES encryption algorithm routine.Wherein template chip (no wooden horse chip) In this document folder in wmm files, chip data to be measured stores in ymmm files in this document data storage, Contain hardware Trojan horse in chip to be measured.
Open operation
Software icon HTDT is double-clicked, waits and is loaded into and runs, into software interface.
Import data
According to interface prompt, survey channel data path stored in computer is inputted in the dialog box of interface, including mould Plate data path, chip path to be measured and filename, and importing data parameters are set, determine the number of data to be imported and Points per data.
It clicks on and imports data button, pending datas is waited to import and are completed, data volume is bigger, and it is also longer to import the time.It imports into It after work(, has and imports successful prompt message, and the data dimension before importing can be shown on dimensionality reduction panel, a number in this example According to data points for 10000, therefore the dimension before dimensionality reduction can be shown as 10000.
Dimensionality reduction
After data import successfully, PCA dimensionality reductions are clicked on, dimensionality reduction can be carried out to data, interface has " just in dimensionality reduction " Message box is shown.Data volume is bigger, and processing time is longer, and after the success of PCA dimensionality reductions, drop is shown in field that can be after dimensionality reduction Dimension after dimension, the data after dimensionality reduction can at least retain the 96% of legacy data information.
Select data processing algorithm and accuracy of detection
Selection will carry out the algorithm and accuracy of detection of data processing, and accuracy of detection is carrying out mahalanobis distance detection and Euclidean It just works during distance detection, accuracy of detection plays the role of as follows when judging:
|D1(n1,m)-D2(n0, m) | > D2(n0,m)×jd×0.01
Wherein D1(n1, m) and to have distance between wooden horse chip data and template chip data, D2(n0, m) and for no wooden horse core Distance between sheet data and template chip data, jd are the precision set on software interface, are meant expressed by precision, work as D1 And D2It is more than D apart from its difference2A few percent when, just judge n1It is the data for having wooden horse chip, otherwise just judges n1For no wooden horse The data of chip, the setting of precision can adjust the threshold value for judging whether there is wooden horse in chip, so as to adjust the accuracy of judgement. User can be configured and be adjusted to precision by input precision or adjustment ticker position.
Selection mahalanobis distance is clicked in this example, precision setting is " 2 ".
1) result figure to be shown is selected
When carrying out mahalanobis distance and Euclidean distance detects, software can show five kinds of result figure (not shown), including:Nothing The distance map of wooden horse chip and template chip chamber;The distance map of chip to be measured and template chip chamber;The comparison diagram of above-mentioned two figure with And the difference of the curve of above-mentioned two figure;Testing result distribution map (accuracy in detection) etc..Exemplified by importing 1000 datas, software meeting Automatically using 1000 of importing without the previous half data of wooden horse chip data (500) as template chip data, latter half data (500) also only take chip data 500 to be measured in data processing, namely why this as no wooden horse chip data Abscissa only has the half of number of data in Dependence Results figure.The comparison diagram of no wooden horse chip and chip to be measured can such as be selected.
2) result is shown
After selecting result to be shown, click starts to detect, and software can be according to the algorithm and precision selected by user Data processing is carried out, and the result of processing is intuitively shown in graph form (as can be by different colours Curve distinguishes the mahalanobis distance of chip to be measured and template chip and the mahalanobis distance without wooden horse chip Yu template chip, passes through curve In each point represent every two homologous threads distance average value, such as can be with representing chip to be measured and template chip First point expression of the curve of mahalanobis distance is the geneva of the first data of chip to be measured and the first data of template chip The average value of distance).
3) reset
After one-time detection has been carried out, if you need to start to handle another group of survey channel data and obtain testing result, Reset button is clicked on, is then repeated the above steps
5.7 result judgement
This software provides four kinds of detection methods:Mahalanobis distance, Euclidean distance, decision tree classifier and random forest point Class device.Wherein mahalanobis distance is similar with the result judgement of Euclidean distance, and user can intuitively be judged according to the curve of generation, So as to draw the conclusion for whether having wooden horse in chip;And decision tree classifier and random forest grader can give in monitoring information Go out detection as a result, decision tree classifier can show the decision tree block diagram (as shown in Figure 9) of generation, random forest grader simultaneously It can show classification accuracy relation distribution map (as shown in Figure 10).
1) judged based on mahalanobis distance and Euclidean distance testing result
User can intuitively be judged according to two figures:
First is the distance (curve 1) of chip to be measured and template chip and the distance without wooden horse chip Yu template chip (curve 2) comparison diagram, if curve 1 has larger fluctuation and amplitude compared with curve 2, then can be determined that and contain in chip to be measured substantially There is hardware Trojan horse, as shown in fig. 6, it could be assumed that containing hardware Trojan horse in the chip to be measured that curve represents.
Second distribution map (as shown in Figure 7) for accuracy in detection, the point to decline on " 0 " are represented in chip to be measured Curve representated by the point is judged as the data of no wooden horse chip, conversely, the point fallen on " 1 " represents the curve representated by the point It is judged as there are the data of wooden horse chip.The testing result of chip to be measured is largely all fallen on " 1 " as seen from the figure, therefore can determine whether The chip to be measured contains hardware Trojan horse.
User can also be according to this testing result of prompt acquisition of information and the accuracy of detection.As shown in Figure 8.
2) judged based on decision tree classifier and the testing result based on random forest grader
User should be primarily upon detection information when carrying out the detection based on decision tree classifier and random forest grader The result information provided in frame.
Can provide total sample in result information, the information and final testing result of training sample and test sample and Accuracy.In addition the detection based on decision tree classifier can provide the structure chart of decision tree, as shown in figure 9, it should be noted that What Fig. 9 emphasis to be stated is the example of decision tree, and the number being overlapped in figure has no effect on the understanding of the present invention.
Detection based on random forest grader can provide classification accuracy relation distribution map, be illustrated in fig. 10 shown below.
Those listed above is a series of to be described in detail only for feasibility embodiment of the invention specifically Bright, they are not to limit the scope of the invention, all equivalent implementations made without departing from skill spirit of the present invention Or change should all be included in the protection scope of the present invention.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Profit requirement rather than above description limit, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included within the present invention.

Claims (5)

1. a kind of hardware Trojan horse detection method based on side Multiple Channel Analysis, which is characterized in that including:
Establishment side channel data collection detection platform;Wherein, the data of the platform acquisition include chip power-consumption data and electromagnetism Signal data;
To the acquired electromagnetic data collected, dimension-reduction treatment is carried out using principal component analytical method, to reduce data volume and extract Effective information;
Detection algorithm is selected to carry out hardware Trojan horse detection, by data analysis, draws testing result.
2. the hardware Trojan horse detection method according to claim 1 based on side Multiple Channel Analysis, which is characterized in that the detection Platform includes host computer, detection object, DC power supply and oscillograph, and the detection object uses FPGA minimum system plates;
The DC power supply is connected with the FPGA minimum systems plate;
The FPGA minimum systems plate communicates with host computer, for downloading program from host computer;
The oscillograph communicates with the FPGA minimum systems plate and host computer.
3. the hardware Trojan horse detection method according to claim 2 based on side Multiple Channel Analysis, which is characterized in that the selection Detection algorithm, which carries out hardware Trojan horse detection, to be included:
Hardware Trojan horse detection based on distance and the hardware Trojan horse detection based on machine learning.
4. the hardware Trojan horse detection method according to claim 3 based on side Multiple Channel Analysis, which is characterized in that the distance For mahalanobis distance or Euclidean distance.
5. the hardware Trojan horse detection method according to claim 4 based on side Multiple Channel Analysis, which is characterized in that the selection Detection algorithm carries out hardware Trojan horse detection and further includes:Hardware Trojan horse detection is carried out based on decision tree or random forests algorithm.
CN201711322625.XA 2017-12-12 2017-12-12 Hardware Trojan horse detection method based on side Multiple Channel Analysis Pending CN108062477A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711322625.XA CN108062477A (en) 2017-12-12 2017-12-12 Hardware Trojan horse detection method based on side Multiple Channel Analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711322625.XA CN108062477A (en) 2017-12-12 2017-12-12 Hardware Trojan horse detection method based on side Multiple Channel Analysis

Publications (1)

Publication Number Publication Date
CN108062477A true CN108062477A (en) 2018-05-22

Family

ID=62138237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711322625.XA Pending CN108062477A (en) 2017-12-12 2017-12-12 Hardware Trojan horse detection method based on side Multiple Channel Analysis

Country Status (1)

Country Link
CN (1) CN108062477A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898034A (en) * 2018-06-27 2018-11-27 天津大学 Hardware Trojan horse side channel detection method based on algorithm of dividing and ruling
CN109150491A (en) * 2018-07-10 2019-01-04 武汉大学 A kind of Mobile portable formula side channel collecting test equipment and its control method
CN109257160A (en) * 2018-12-05 2019-01-22 电子科技大学 A kind of side channel template attack method based on decision tree
CN109490735A (en) * 2018-10-12 2019-03-19 上海谱幂精密仪器科技有限公司 It is a kind of for measuring the device and method of electric current and/or voltage
CN109557449A (en) * 2018-10-23 2019-04-02 中国科学院计算技术研究所 Based on the difficult integrated circuit detection method and system for surveying Path selection
CN110059504A (en) * 2019-03-01 2019-07-26 西安电子科技大学 A kind of hardware Trojan horse detection method and device
CN110098916A (en) * 2019-04-08 2019-08-06 武汉大学 A kind of high-order side Multiple Channel Analysis method based on software instruction positioning
CN110096880A (en) * 2019-04-28 2019-08-06 天津大学 Hardware Trojan horse localization method based on chip surface scanning
CN112084541A (en) * 2020-08-11 2020-12-15 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Hardware Trojan horse detection method and system, computer equipment and readable storage medium
CN112464297A (en) * 2020-12-17 2021-03-09 清华大学 Hardware Trojan horse detection method and device and storage medium
CN113553630A (en) * 2021-06-15 2021-10-26 西安电子科技大学 Hardware Trojan horse detection system based on unsupervised learning and information data processing method
CN115310144A (en) * 2022-07-08 2022-11-08 合肥先端晶体科技有限责任公司 Hardware Trojan horse detection system and method based on diamond NV color center

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815532A (en) * 2015-11-27 2017-06-09 天津科技大学 A kind of hardware Trojan horse based on distance measure distribution detects method of discrimination
CN106841987A (en) * 2017-01-25 2017-06-13 天津大学 Hardware Trojan horse side channel detection method based on electromagnetism and electric current
CN106872876A (en) * 2017-01-25 2017-06-20 天津大学 Based on electromagnetism and the hardware Trojan horse side channel detection method for postponing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815532A (en) * 2015-11-27 2017-06-09 天津科技大学 A kind of hardware Trojan horse based on distance measure distribution detects method of discrimination
CN106841987A (en) * 2017-01-25 2017-06-13 天津大学 Hardware Trojan horse side channel detection method based on electromagnetism and electric current
CN106872876A (en) * 2017-01-25 2017-06-20 天津大学 Based on electromagnetism and the hardware Trojan horse side channel detection method for postponing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
杨松: "基于主成分分析的硬件木马检测技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
王晓晗 等: "基于核主成分分析的硬件木马检测方法研究", 《计算机测量与控制》 *
苏静 等: "旁路信号主成分分析的欧式距离硬件木马检测", 《微电子学与计算机》 *
赵毅强 等: "基于主成分分析的硬件木马检测方法", 《华中科技大学学报(自然科学版)》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898034A (en) * 2018-06-27 2018-11-27 天津大学 Hardware Trojan horse side channel detection method based on algorithm of dividing and ruling
CN108898034B (en) * 2018-06-27 2021-07-06 天津大学 Hardware Trojan side channel detection method based on divide and conquer algorithm
CN109150491A (en) * 2018-07-10 2019-01-04 武汉大学 A kind of Mobile portable formula side channel collecting test equipment and its control method
CN109150491B (en) * 2018-07-10 2021-11-09 武汉大学 Mobile portable side channel acquisition and test equipment and control method thereof
CN109490735A (en) * 2018-10-12 2019-03-19 上海谱幂精密仪器科技有限公司 It is a kind of for measuring the device and method of electric current and/or voltage
CN109557449A (en) * 2018-10-23 2019-04-02 中国科学院计算技术研究所 Based on the difficult integrated circuit detection method and system for surveying Path selection
CN109257160A (en) * 2018-12-05 2019-01-22 电子科技大学 A kind of side channel template attack method based on decision tree
CN109257160B (en) * 2018-12-05 2023-07-04 电子科技大学 Side channel template attack method based on decision tree
CN110059504B (en) * 2019-03-01 2021-02-26 西安电子科技大学 Hardware Trojan horse detection method and device
CN110059504A (en) * 2019-03-01 2019-07-26 西安电子科技大学 A kind of hardware Trojan horse detection method and device
CN110098916B (en) * 2019-04-08 2021-07-20 武汉大学 High-order side channel analysis method based on software instruction positioning
CN110098916A (en) * 2019-04-08 2019-08-06 武汉大学 A kind of high-order side Multiple Channel Analysis method based on software instruction positioning
CN110096880B (en) * 2019-04-28 2023-04-28 天津大学 Hardware Trojan positioning method based on chip surface scanning
CN110096880A (en) * 2019-04-28 2019-08-06 天津大学 Hardware Trojan horse localization method based on chip surface scanning
CN112084541A (en) * 2020-08-11 2020-12-15 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Hardware Trojan horse detection method and system, computer equipment and readable storage medium
CN112464297A (en) * 2020-12-17 2021-03-09 清华大学 Hardware Trojan horse detection method and device and storage medium
CN112464297B (en) * 2020-12-17 2024-06-04 清华大学 Hardware Trojan detection method, device and storage medium
CN113553630B (en) * 2021-06-15 2023-06-23 西安电子科技大学 Hardware Trojan detection system based on unsupervised learning and information data processing method
CN113553630A (en) * 2021-06-15 2021-10-26 西安电子科技大学 Hardware Trojan horse detection system based on unsupervised learning and information data processing method
CN115310144A (en) * 2022-07-08 2022-11-08 合肥先端晶体科技有限责任公司 Hardware Trojan horse detection system and method based on diamond NV color center

Similar Documents

Publication Publication Date Title
CN108062477A (en) Hardware Trojan horse detection method based on side Multiple Channel Analysis
CN108665297B (en) Method and device for detecting abnormal access behavior, electronic equipment and storage medium
CN104756106B (en) Data source in characterize data storage system
CN104182335B (en) Method for testing software and device
CN109375945A (en) Firmware version detection method and vulnerability repair rate evaluation method for Internet of things equipment
CN110348441A (en) VAT invoice recognition methods, device, computer equipment and storage medium
CN103136471A (en) Method and system for testing malicious Android application programs
CN110414277B (en) Gate-level hardware Trojan horse detection method based on multi-feature parameters
CN107967485A (en) Electro-metering equipment fault analysis method and device
CN105205396A (en) Detecting system for Android malicious code based on deep learning and method thereof
CN103488941A (en) Hardware Trojan horse detection method and hardware Trojan horse detection system
CN104766015B (en) A kind of buffer-overflow vulnerability dynamic testing method based on function call
CN110175236A (en) Training sample generation method, device and computer equipment for text classification
CN106240839A (en) For analyzing the system and method for flutter test data
CN110489314A (en) Model method for detecting abnormality, device, computer equipment and storage medium
JP2005513841A5 (en)
CN105630656B (en) System robustness analysis method and device based on log model
CN106874760A (en) A kind of Android malicious code sorting techniques based on hierarchy type SimHash
CN109886016A (en) For detecting the method, equipment and computer readable storage medium of abnormal data
CN109684834A (en) A kind of gate leve hardware Trojan horse recognition method based on XGBoost
CN104268289B (en) The abatement detecting method and device of link URL
CN102324007A (en) Method for detecting abnormality based on data mining
Frank et al. Extracting operating modes from building electrical load data
CN108897765A (en) A kind of batch data introduction method and its system
CN101930401B (en) Detection object-based software vulnerability model detection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180522