CN108256357A - Hardware Trojan Horse Detection Method Combining Infrared Image and Normal Distribution Analysis - Google Patents

Hardware Trojan Horse Detection Method Combining Infrared Image and Normal Distribution Analysis Download PDF

Info

Publication number
CN108256357A
CN108256357A CN201810022018.XA CN201810022018A CN108256357A CN 108256357 A CN108256357 A CN 108256357A CN 201810022018 A CN201810022018 A CN 201810022018A CN 108256357 A CN108256357 A CN 108256357A
Authority
CN
China
Prior art keywords
infrared image
temperature
point
circuit
hardware trojan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810022018.XA
Other languages
Chinese (zh)
Other versions
CN108256357B (en
Inventor
陈吉华
唐永康
侯申
何小威
李少青
乐大珩
沈高
张若男
张启明
隋强
胡星
杨彬彬
赵晟
聂星宇
成钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201810022018.XA priority Critical patent/CN108256357B/en
Publication of CN108256357A publication Critical patent/CN108256357A/en
Application granted granted Critical
Publication of CN108256357B publication Critical patent/CN108256357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/30Transforming light or analogous information into electric information
    • H04N5/33Transforming infrared radiation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • G01J2005/0077Imaging

Abstract

A hardware Trojan horse detection method combining infrared images and normal distribution analysis comprises the following steps: s1: capturing an infrared image; enabling a pure chip sample without a hardware trojan and a tested chip with the same type to start working simultaneously, and capturing infrared images of the pure chip sample without the hardware trojan and the tested chip with the same type by using image acquisition equipment; s2: carrying out first difference on the obtained infrared image; within a period of sampling, each sampling moment has a pair of infrared images, and the infrared images are differentiated to obtain a differentiated infrared image; s3: and carrying out second difference on the differential infrared image at each moment. Extracting each pixel point in the differential infrared image obtained by the first difference, and drawing the differential temperature on a coordinate graph taking time as an abscissa; s4: judging; the differential temperature of the point with the Trojan is higher; s5: and carrying out normal distribution statistical analysis. The invention has the advantages of high detection precision, low detection cost, high detection efficiency and the like.

Description

The hardware Trojan horse detection method that infrared image is combined with normal distribution analysis
Technical field
Present invention relates generally to the hardware Trojan horse detection fields of integrated circuit, refer in particular to a kind of infrared image and normal distribution Analyze the hardware Trojan horse detection method combined.
Background technology
As the cost of integrated circuit production line is higher and higher, many IC designers are selected integrated circuit It manufactures this link and is contracted out to third party Foundry Works.This outsourcing results in the credible risk of integrated circuit, in ifq circuit Additional malice circuit may be implanted, this malice circuit is referred to as hardware Trojan horse.Hardware Trojan horse detection has become core One important topic of piece security fields, a variety of detection methods are suggested, such as function and structured testing method, design for Measurability Method, reverse post-mortem method, by-passing signal detection method etc..
Reversed anatomy verification method, is substantially that one kind is based on as the most common type destructiveness hardware Trojan horse detection means The analytical technology that intrusive mood checks.Usually the ifq circuit that production obtains is dissected, the gold in photo will be extracted after photograph Belong to line pattern to compare with the picture that layout file extracts, the difference between pattern is analyzed, if result of the comparison is shown The chip layout inversely extracted coincide with original layout, and illustrating domain, there is no hardware Trojan horses, and otherwise, circuit may be implanted Hardware Trojan horse.The shortcomings that reversed anatomy verification, is:First, the process of chip conversed analysis is extremely complex, and verification process is slow; 2nd, this is a kind of destructive hardware Trojan horse detection mode, and detected chip has been scrapped completely after completing to detect can not be after It is continuous to use.
Functional test, hardware Trojan horse in order to destroy the normal function of original circuit or leak chip in secret number According to all inevitably being distorted to the normal function of chip circuit.Functional test in circuit input end mouth by applying Test vector, whether comparison output is consistent with normal state, and whether hardware Trojan horse is implanted by malice with this assessment circuit.It is theoretical On say if can traverse all working state and redundant state in chip can trigger hardware Trojan horse to find Whether hardware Trojan horse has been inserted into circuit, but many chips are on a grand scale at present, complexity is very high, the range of state space It is exponentially increased, so that the method cost of functional test is too greatly without can be achieved.
The information such as bypass message analytic approach, power consumption, temperature, the delay that circuit generates when working are known as bypass message.It is based on It, can be from the original for distorting circuit in varying degrees after the principle of bypass analysis hardware Trojan horse is that circuit is implanted hardware Trojan horse circuit Begin composition and size so that the circuit after implantation hardware Trojan horse shows the bypass message feature different from ifq circuit.Therefore, Whether sampled and examined by the bypass message to circuit can be implanted hardware Trojan horse in identification chip.
In conclusion the above method or there are cost it is excessively high the problem of or there are detection result it is bad the problem of.
Invention content
The technical problem to be solved in the present invention is that:For technical problem of the existing technology, the present invention provides one The hardware Trojan horse detection that the infrared image that kind accuracy of detection is high, testing cost is low, detection efficiency is high is combined with normal distribution analysis Method.
In order to solve the above technical problems, the present invention uses following technical scheme:
The hardware Trojan horse detection method that a kind of infrared image is combined with normal distribution analysis, step are:
S1:Capture infrared image;
The pure chip sample of one piece of no hardware Trojan horse and the chip under test of one piece of same model is allowed to start simultaneously at work, Then with the infrared image of both in image capture device capture a period of time;
S2:First time difference is carried out to the infrared image of acquisition;
Within a period of time sampled, each sampling instant has a pair of of infrared image, and difference is carried out to the two, Obtain a differentiated infrared image;Aforesaid operations are carried out to a pair of of image at each moment, when just obtaining each Carve the difference infrared image of chip under test and purified sample;
S3:Second of difference is carried out to the difference infrared image at each moment.
Each pixel in the difference infrared image that first time difference is obtained extracts, its differential temperature is drawn In the coordinate diagram using the time as abscissa;
S4:Judge;
In the coordinate diagram obtained in step S3, the differential temperature for having the point of wooden horse can be higher than the differential temperature of no wooden horse point.
S5:Carry out normal distribution statistical analysis;
The data that step S4 is obtained carry out normal distribution statistical, and then using 3 δ confidence interval principles, differential temperature exists Be considered normal circuit in section, except be then considered wooden horse circuit.
As a further improvement on the present invention:In step s 4, by Kalman filtering, the last observation knot of influence is filtered out That line corresponding to hardware Trojan horse point is clearly displayed out, reaches better detection result by the noise of fruit.
As a further improvement on the present invention:In step sl, it is sampled by thermal camera.
As a further improvement on the present invention:The flow of the step S4 is:
S401:The temperature of any point P is represented with following formula on setting chip:
TP=TmeasurementP+TenvironmentP+TcircuitsP+TprocesP+eTPround
Wherein, TpIt is the total moisture content of P points;TmeasurementPMeasure temperature noise, TenvironmentPIt is ambient temperature noise, this Two noise likes are all white Gaussian noises;TcircuitsPBe the point included circuit normal work caused by temperature;TprocessPIt is Temperature deviation caused by process deviation;TProundIt is the temperature that the work of P points peripheral circuit generates;E is a parameter, represents P points week Enclose influence of the temperature to P point temperature;
S402:When not including any circuit, temperature expression formula is reduced to:
TP=TmeasurementP+TenvironmentP+eTPround
When any contains hardware Trojan horse, temperature expression formula is rewritten as:
TP=TmeasurementP+TenvironmentP+
TcircuitsP+TprocessP+eTPround+TTrojan
S403:For different type point P1, P2, P3, its differentiated temperature expression formula is listed respectively:
ΔTP1=Δ TmeasurementP1+ΔTenvironmentP1
+ΔTprocessP1+eΔTP1round
ΔTP2=Δ TmeasurementP2+ΔTenvironmentP2
+ΔTprocessP2+eΔTP2round+TTrojan
ΔTP3=Δ TmeasurementP3+ΔTenvironmentP3+eΔTP3round
Wherein, P1 types point is the point comprising normal circuit, and corresponding points of this on pure chip are also normal circuit; P2 types point is the point comprising normal circuit and wooden horse circuit, corresponding points of this on pure chip only comprising normal circuit and Not comprising wooden horse circuit;P3 types point is white space, and without circuit, the point corresponded on pure chip does not include similarly Circuit.
As a further improvement on the present invention:By belong to white Gaussian noise measurement temperature noise and ambient temperature noise from It is erased in differential temperature expression formula, differential temperature expression formula is reduced to following form:
ΔTP1=Δ TprocessP1+eΔTP1round
ΔTP2=Δ TprocessP2+eΔTP2round+TTrojan
ΔTP3=e Δs TP3round
Compared with prior art, the advantage of the invention is that:
1st, the hardware Trojan horse detection method that infrared image of the invention is combined with normal distribution analysis, when being worked using circuit Heat signal analyzed, belong to bypass message analysis method.Method proposed by the present invention both overcome reversely verification it is high into This, and the shortcomings that destroy chip, also without the short slab of functional test not realizability, thus be a kind of low cost, it can be achieved that Technology.
2nd, the hardware Trojan horse detection method that infrared image of the invention is combined with normal distribution analysis, testing cost is low, only Chip is needed to start normal work to complete the detection to chip, chip will not be damaged in itself, it is not required that very The long time.Requirement to detection device is also only a high-precision thermal camera, a set of cooling system and set of complementary Software systems.
3rd, the hardware Trojan horse detection method that infrared image of the invention is combined with normal distribution analysis, accuracy of detection is high, warp Experiment is crossed, it is 10 that method of the invention, which can detect energy consumption magnitude,-3Hardware Trojan horse.
Description of the drawings
Fig. 1 is the flow diagram of the method for the present invention.
Fig. 2 is principle schematic of the present invention in concrete application example.
Fig. 3 is the infrared image schematic diagram of present invention chip in a concrete application example.
Fig. 4 is result schematic diagram of the present invention in concrete application example.
Fig. 5 is the schematic diagram one that the present invention carries out normal distribution statistical analysis in concrete application example.
Fig. 6 is the schematic diagram two that the present invention carries out normal distribution statistical analysis in concrete application example.
Fig. 7 is the schematic diagram three that the present invention carries out normal distribution statistical analysis in concrete application example.
Fig. 8 is the schematic diagram four that the present invention carries out normal distribution statistical analysis in concrete application example.
Fig. 9 is the schematic diagram five that the present invention carries out normal distribution statistical analysis in concrete application example.
Figure 10 is the schematic diagram six that the present invention carries out normal distribution statistical analysis in concrete application example.
Specific embodiment
The present invention is described in further details below with reference to Figure of description and specific embodiment.
Hardware Trojan horse is made of two parts --- triggering part and loading section.Triggering part can be constantly in work shape State, because it needs the state of observation circuit and the activation loading section work specific at the time of.In running order triggering Part may require that consumption energy, so as to generate heat and to space scattering.This heat can be captured by thermal camera, this is just It is the variation caused by hardware Trojan horse on heat bypass message, the present invention is detected using this heat bypass message.
As depicted in figs. 1 and 2, the hardware Trojan horse detection method that infrared image of the invention is combined with normal distribution analysis, Its step is:
S1:Capture infrared image.
The pure chip sample of one piece of no hardware Trojan horse and the chip under test of one piece of same model is allowed to start simultaneously at work, Then with the infrared image of both in thermal camera capture a period of time.
S2:First time difference is carried out to the infrared image of acquisition.
Within a period of time sampled with thermal camera, each sampling instant has a pair of of infrared image --- They carry out difference to the two, obtain a differentiated infrared image respectively from chip under test and purified sample.
Aforesaid operations are carried out to a pair of of image at each moment, it is possible to obtain each moment chip under test with it is pure The difference infrared image of net sample.
S3:Second of difference is carried out to the difference infrared image at each moment.
Each pixel in the difference infrared image that first time difference is obtained extracts, its differential temperature is drawn In the coordinate diagram using the time as abscissa.
Since the information of the upper no wooden horse circuit of chip under test will have been supported by the corresponding circuits in pure chip sample Disappear, and there is wooden horse circuit there is no corresponding circuit on pure chip on chip under test, therefore have the difference temperature of the point of wooden horse Degree can be higher than the differential temperature of no wooden horse point.
S4:Judge.
In the coordinate diagram obtained in step S3, the differential temperature for having the point of wooden horse can be higher than the differential temperature of no wooden horse point.
S5:Normal distribution statistical is analyzed;
For excluding the interference of detection of the ambient noise to wooden horse.The value of differential temperature meets normal distribution, then using 3 δ confidence interval principles, differential temperature are considered normal circuit in section, except be then considered wooden horse circuit, will obtain The data arrived carry out normal distribution statistical>>Using 3 δ confidence interval principles, differential temperature is considered normal electricity in section Road, except be then considered wooden horse circuit.Referring to Fig. 5-Fig. 8, the data in figure in red circle are the information of hardware Trojan horse, referring to figure 9 and Figure 10 does not include hardware Trojan horse in figure.
Step S4 is the information for identifying hardware Trojan horse by naked eyes in coordinate diagram, since wooden horse information is by ambient noise Interference, it is usually little with the discrimination of normal circuit, in this case can be by identification person by the result of naked eyes identification The interference of people's subjective factor.There is normal distribution statistical method, the discriminating of hardware Trojan horse can break away from factor and individual subjective factor Interference, and have a unified mathematics scale.
After the hardware Trojan horse of different energy consumption magnitudes is implanted on FPGA, the FPGA is detected using this method, simultaneously It it is not implanted into hardware Trojan horse using one contains only the FPGA of pure circuit and compareed as female parent.The experimental results showed that energy consumption is accounted for Hardware Trojan horse than more than 0.11%, method of the invention are all successfully detected.
Further, in the preferred embodiment, in step s 4, can also influence be filtered out most by Kalman filtering The noise of result is observed afterwards, so as to clearly display out that line corresponding to hardware Trojan horse point, reaches better detection Effect.
As shown in figure 3, in a concrete application example, the infrared image schematic diagram for providing a chip is as follows, it is assumed that A It is pure chip, B is chip under test.With this figure come the problem of illustrating region that hardware Trojan horse is implanted.
See chip to be measured, that is, B first, the pixel on chip can be divided into three types, the first type altogether Type P1 type points, that is, the point comprising normal circuit, corresponding points of this on pure chip are also normal circuit.Second It is P2 types point, that is, the point comprising normal circuit and wooden horse circuit, corresponding points of this on pure chip are only comprising just Normal circuit and not comprising wooden horse circuit.The third is P3 types point, which is white space, without circuit, is corresponded to pure Point on chip does not include circuit similarly.
During chip production, there are two types of process deviations.A kind of is the process deviation between chip and chip, referred to as Process deviation between piece;Another kind is the deviation between difference in same chip, referred to as on piece process deviation.These techniques are inclined Difference will also result in the difference of chip operating temperature, so as to influence the detection of hardware Trojan horse.In general, process deviation is long-range between piece In on piece process deviation.
The temperature of any point P can be represented with following formula on chip:
TP=TmeasurementP+TenvironmentP+TcircuitsP+TprocessP+eTPround
Wherein, TpIt is the total moisture content of P points.TmeasurementPMeasure temperature noise, TenvironmentPIt is ambient temperature noise, this Two noise likes are all white Gaussian noises.TcircuitsPBe the point included circuit normal work caused by temperature.TprocessPIt is Temperature deviation caused by process deviation.TProundIt is the temperature that the work of P points peripheral circuit generates.E is a parameter, represents P points week Enclose influence of the temperature to P point temperature.
So when not including any circuit, temperature expression formula is reduced to:
TP=TmeasurementP+TenvironmentP+eTPround
When any contains hardware Trojan horse, temperature expression formula is rewritten as:
TP=TmeasurementP+TenvironmentP+
TcircuitsP+TprocessP+eTPround+TTrojan
So for P1, P2, P3 type point in figure, its differentiated temperature expression formula can be listed respectively:
ΔTP1=Δ TmeasurementP1+ΔTenvironmentP1
+ΔTprocessP1+eΔTP1round
ΔTP2=Δ TmeasurementP2+ΔTenvironmentP2
+ΔTprocessP2+eΔTP2round+TTrojan
ΔTP3=Δ TmeasurementP3+ΔTenvironmentP3+eΔTP3round
All it is white Gaussian noise due to measuring temperature noise and ambient temperature noise, gaussian filtering method can be used to remove, Therefore it for the ease of analysis, is erased from differential temperature expression formula, so as to which differential temperature expression formula to be reduced to following form:
ΔTP1=Δ TprocessP1+eΔTP1round
ΔTP2=Δ TprocessP2+eΔTP2round+TTrojan
ΔTP3=e Δs TP3round
If as shown in figure 4, the differential temperature of all pixels point is drawn in by horizontal axis of the time in coordinate diagram, due to technique The continuity of deviation, the information of P1 types point can form a process deviation band, and P3 types point can then form another and be sunken to The process deviation band of bottom.P2 types point can then float on top, so as to reach hardware Trojan horse because of a more hardware Trojan horse item Information it is clear, so as to detect hardware Trojan horse.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment, All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as the protection of the present invention Range.

Claims (5)

1. the hardware Trojan horse detection method that a kind of infrared image and normal distribution analysis combine, which is characterized in that step is:
S1:Capture infrared image;
The pure chip sample of one piece of no hardware Trojan horse and the chip under test of one piece of same model is allowed to start simultaneously at work, then With the infrared image of both in image capture device capture a period of time;
S2:First time difference is carried out to the infrared image of acquisition;
Within a period of time sampled, each sampling instant has a pair of of infrared image, carries out difference to the two, obtains One differentiated infrared image;Aforesaid operations are carried out to a pair of of image at each moment, just obtain each moment quilt Survey the difference infrared image of chip and purified sample;
S3:Second of difference is carried out to the difference infrared image at each moment.
First time difference obtain difference infrared image in each pixel extract, by its differential temperature be drawn in Time is in the coordinate diagram of abscissa;
S4:Judge;
In the coordinate diagram obtained in step S3, the differential temperature for having the point of wooden horse can be higher than the differential temperature of no wooden horse point;
S5:Carry out normal distribution statistical analysis;
The data that step S4 is obtained carry out normal distribution statistical, and then using 3 δ confidence interval principles, differential temperature is in section Interior is considered normal circuit, except be then considered wooden horse circuit.
2. the hardware Trojan horse detection method that infrared image according to claim 1 is combined with normal distribution analysis, feature It is, in step s 4, by Kalman filtering, filters out the noise for influencing last observation result, hardware Trojan horse point institute is right That line answered clearly displays out, reaches better detection result.
3. the hardware Trojan horse detection method that infrared image according to claim 1 is combined with normal distribution analysis, feature It is, in step sl, is sampled by thermal camera.
4. the hardware Trojan horse detection method that the infrared image according to claims 1 or 2 or 3 is combined with normal distribution analysis, It is characterized in that, the flow of the step S4 is:
S401:The temperature of any point P is represented with following formula on setting chip:
TP=PmeasurementP+TenvironmentP+TcircuitsP+TprocessP+eTPround
Wherein, TpIt is the total moisture content of P points;TmeasurementPMeasure temperature noise, TenvironmentPIt is ambient temperature noise, this two class Noise is all white Gaussian noise;TcircuitsPBe the point included circuit normal work caused by temperature;TprocessPIt is technique Temperature deviation caused by deviation;TProundIt is the temperature that the work of P points peripheral circuit generates;E is a parameter, is represented warm around P points Spend the influence to P point temperature;
S402:When not including any circuit, temperature expression formula is reduced to:
TP=TmeasurementP+TenvironmentP+eTPround
When any contains hardware Trojan horse, temperature expression formula is rewritten as:
TP=TmeasurementP+TenvironmetP+
TciruitsP+TprocessP+eTPround+TTrojan
S403:For different type point P1, P2, P3, its differentiated temperature expression formula is listed respectively:
ΔTP1=Δ TmeasurementP1+ΔTenvironmentP1
+ΔTprocessP1+eΔTPlround
ΔTP2=Δ TmeasurementP2+ΔTenvironmentP2
+ΔTprocessP2+eΔTP2round+TTrojan
ΔTP3=Δ TmeasurementP3+ΔTenvironmentP3+eΔTP3round
Wherein, P1 types point is the point comprising normal circuit, and corresponding points of this on pure chip are also normal circuit;P2 classes Type point is the point comprising normal circuit and wooden horse circuit, and corresponding points of this on pure chip are only comprising normal circuit without wrapping Circuit containing wooden horse;P3 types point is white space, and without circuit, the point corresponded on pure chip does not include electricity similarly Road.
5. the hardware Trojan horse detection method that infrared image according to claim 4 is combined with normal distribution analysis, feature It is, the measurement temperature noise for belonging to white Gaussian noise and ambient temperature noise is erased from differential temperature expression formula, it will be poor Point temperature expression formula is reduced to following form:
ΔTP1=Δ TprocessP1+eΔTPlround
ΔTP2=Δ TprocessP2+eΔTP2round+TTrojan
ΔTP3=e Δs TP3round
CN201810022018.XA 2018-01-10 2018-01-10 Hardware Trojan horse detection method combining infrared image and normal distribution analysis Active CN108256357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810022018.XA CN108256357B (en) 2018-01-10 2018-01-10 Hardware Trojan horse detection method combining infrared image and normal distribution analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810022018.XA CN108256357B (en) 2018-01-10 2018-01-10 Hardware Trojan horse detection method combining infrared image and normal distribution analysis

Publications (2)

Publication Number Publication Date
CN108256357A true CN108256357A (en) 2018-07-06
CN108256357B CN108256357B (en) 2021-03-02

Family

ID=62724937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810022018.XA Active CN108256357B (en) 2018-01-10 2018-01-10 Hardware Trojan horse detection method combining infrared image and normal distribution analysis

Country Status (1)

Country Link
CN (1) CN108256357B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272502A (en) * 2018-09-28 2019-01-25 电子科技大学 PCB hardware security detection method based on temperature field-effect
CN110232278A (en) * 2019-05-10 2019-09-13 中国人民解放军国防科技大学 Frequency-reducing time-sharing A2 Trojan horse detection method and device based on composite ring oscillator
CN110298200A (en) * 2019-07-05 2019-10-01 电子科技大学 Asic chip hardware back door detection method based on temperature statistics signature analysis
CN110866290A (en) * 2018-11-21 2020-03-06 哈尔滨安天科技集团股份有限公司 Chip malicious tampering detection method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104614660A (en) * 2015-01-09 2015-05-13 中国电子科技集团公司第五十八研究所 Method for detecting hardware Trojan based on active optical watermark
US10303878B2 (en) * 2016-01-22 2019-05-28 Yu-Liang Wu Methods and apparatus for automatic detection and elimination of functional hardware trojans in IC designs

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104614660A (en) * 2015-01-09 2015-05-13 中国电子科技集团公司第五十八研究所 Method for detecting hardware Trojan based on active optical watermark
US10303878B2 (en) * 2016-01-22 2019-05-28 Yu-Liang Wu Methods and apparatus for automatic detection and elimination of functional hardware trojans in IC designs

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GAO SHEN 等: "《Proceedings of 2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)》", 27 October 2017 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272502A (en) * 2018-09-28 2019-01-25 电子科技大学 PCB hardware security detection method based on temperature field-effect
CN110866290A (en) * 2018-11-21 2020-03-06 哈尔滨安天科技集团股份有限公司 Chip malicious tampering detection method and device, electronic equipment and storage medium
CN110232278A (en) * 2019-05-10 2019-09-13 中国人民解放军国防科技大学 Frequency-reducing time-sharing A2 Trojan horse detection method and device based on composite ring oscillator
CN110232278B (en) * 2019-05-10 2021-03-16 中国人民解放军国防科技大学 Frequency-reducing time-sharing A2 Trojan horse detection method and device based on composite ring oscillator
CN110298200A (en) * 2019-07-05 2019-10-01 电子科技大学 Asic chip hardware back door detection method based on temperature statistics signature analysis

Also Published As

Publication number Publication date
CN108256357B (en) 2021-03-02

Similar Documents

Publication Publication Date Title
CN108256357A (en) Hardware Trojan Horse Detection Method Combining Infrared Image and Normal Distribution Analysis
AU2023201724A1 (en) System for counting number of game tokens
CN110309876A (en) Object detection method, device, computer readable storage medium and computer equipment
CN110414277B (en) Gate-level hardware Trojan horse detection method based on multi-feature parameters
CN109520690A (en) A kind of rotary machine rotor Mode Shape global measuring device and method based on video
CN109884727A (en) Foreign matter detecting method, detection device for foreign matter and electronic equipment
CN104954736A (en) Stay condition analyzing apparatus, stay condition analyzing system, and stay condition analyzing method
CN108387832A (en) Infrared image hardware Trojan horse detection method based on secondary temperature difference
CN108846306A (en) A kind of identity card Compare System and method based on deep learning recognition of face
CN104182987A (en) People counting device and people trajectory analysis device
CN108333498A (en) Non-maternal hardware Trojan horse detection method based on infrared chart side channel analysis
CN109086734A (en) The method and device that pupil image is positioned in a kind of pair of eye image
CN107622489A (en) A kind of distorted image detection method and device
CN107016373A (en) The detection method and device that a kind of safety cap is worn
CN106169075A (en) Auth method and device
CN109492509A (en) Personal identification method, device, computer-readable medium and system
CN108268776A (en) Hardware Trojan horse detection method combining infrared image and space projection conversion
CN109753985A (en) Video classification methods and device
CN109558773A (en) Information identifying method, device and electronic equipment
CN106127866A (en) Ticket checking method and channel management equipment
CN106782671B (en) A kind of safety chip enters the method and apparatus of test pattern
CN109002714A (en) Key node hardware Trojan horse detection method and device based on power consumption mean analysis
JP3443083B2 (en) Method of evaluating dangerous spot information of semiconductor device pattern
CN115077722A (en) Partial discharge and temperature comprehensive monitoring system and method applied to high-voltage cabinet
CN110298200A (en) Asic chip hardware back door detection method based on temperature statistics signature analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant