CN111208415A - Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit - Google Patents

Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit Download PDF

Info

Publication number
CN111208415A
CN111208415A CN202010042795.8A CN202010042795A CN111208415A CN 111208415 A CN111208415 A CN 111208415A CN 202010042795 A CN202010042795 A CN 202010042795A CN 111208415 A CN111208415 A CN 111208415A
Authority
CN
China
Prior art keywords
ring oscillator
chip
dynamic simulation
circuit
signal input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010042795.8A
Other languages
Chinese (zh)
Inventor
史江义
叶晓伟
李鹏飞
郝跃
马佩军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202010042795.8A priority Critical patent/CN111208415A/en
Publication of CN111208415A publication Critical patent/CN111208415A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequences
    • G01R31/318328Generation of test inputs, e.g. test vectors, patterns or sequences for delay tests
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/31704Design for test; Design verification
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequences
    • G01R31/318307Generation of test inputs, e.g. test vectors, patterns or sequences computer-aided, e.g. automatic test program generator [ATPG], program translations, test program debugging

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Tests Of Electronic Circuits (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明属于集成电路检测技术领域,具体涉及一种分布型环形振荡器网络版图填充硬件木马检测方法及电路,包括:获取载体电路中的脆弱节点;在载体电路上添加初始检测电路得到添加初始检测电路的载体电路;设置工艺偏差波动范围,并建立具有工艺偏差波动的工艺库;填充环形振荡器网络得到第一安全芯片和第二安全芯片;向第二安全芯片内植入预设硬件木马得到待测芯片;进行动态仿真构建安全芯片路径延迟信息数据集和待测芯片路径延迟信息数据集;提取主要特征分量,并分别进行降维处理得到安全低维数据和待测低维数据;进行对比分析得到分析结果。具有提高芯片延迟信息精度、提高检测准确率、减小芯片面积消耗和实现了硬件木马定位的有益效果。

Figure 202010042795

The invention belongs to the technical field of integrated circuit detection, and in particular relates to a distributed ring oscillator network layout filling hardware Trojan detection method and circuit, comprising: acquiring vulnerable nodes in a carrier circuit; adding an initial detection circuit on the carrier circuit to obtain an added initial detection circuit The carrier circuit of the circuit; set the process deviation fluctuation range, and establish a process library with process deviation fluctuation; fill the ring oscillator network to obtain the first security chip and the second security chip; implant the preset hardware Trojan into the second security chip to obtain The chip to be tested; perform dynamic simulation to construct the security chip path delay information data set and the test chip path delay information data set; extract the main feature components, and perform dimensionality reduction processing to obtain the secure low-dimensional data and the low-dimensional data to be tested; compare Analyze to get the analysis result. The invention has the beneficial effects of improving the precision of chip delay information, improving detection accuracy, reducing chip area consumption and realizing hardware Trojan horse positioning.

Figure 202010042795

Description

Distributed ring oscillator network layout filling hardware Trojan horse detection method and circuit
Technical Field
The invention belongs to the technical field of integrated circuit detection, and particularly relates to a distributed ring oscillator network layout filling hardware Trojan horse detection method and circuit.
Background
As integrated circuit technology advances to the submicron level, the complexity and cost of integrated circuits increases dramatically, with only a few companies having the ability to maintain the entire supply chain from design to fabrication. To reduce costs, design companies have moved the manufacturing process of some chips to third party companies or manufacturing plants that have lower production costs, which are not completely trusted. An attacker may maliciously insert a circuit, i.e. a hardware trojan, in the chip to implement a certain function. Hardware trojans may cause leakage of critical information, circuit malfunction, and reduced chip reliability, even destroying the system under specific design conditions.
The safety problem of the integrated circuit is widely concerned, the independent credibility of the chip becomes an urgent need, and the detection theory and method of the hardware Trojan horse become the leading edge and hot research subject of the field of the integrated circuit at home and abroad. At present, hardware Trojan horse detection methods are multiple, and mainly comprise a reverse-cut chip, bypass information analysis and Trojan horse activation. The detection method based on the side channel information mainly judges whether the chip to be detected contains the hardware Trojan horse or not by comparing the side channel information difference between the security chip and the chip to be detected. The method has the advantages that the circuit does not need to be damaged (failure analysis), the Trojan horse circuit does not need to be completely activated (logic test technology), and the method has a good detection effect, a high detection rate and low detection cost.
However, the present detection method based on side channel information, which uses the delay information of the chip as a fingerprint to determine whether there is a hardware Trojan in the chip to be tested, can only detect the hardware Trojan greatly affecting the critical path, and if it is necessary to detect the hardware Trojan only changing the delay of the non-critical path, it is necessary to do a lot of test cases; however, in order to keep the concealment of the Trojan horse, the Trojan horse mostly exists on a non-critical path, so that the influence of the existence of the Trojan horse on the time delay and the power consumption is reduced; meanwhile, most of the hardware trojans of the combinational logic type do not have connection with a clock network, so that the existence of the hardware trojans of the combinational logic type is difficult to detect.
In addition, in the manufacturing process of the integrated circuit, when a gate is formed, different processes can be used at different positions by using a mask plate, so that important parameters of the actual device, such as gate length, gate width, gate oxide thickness and the like, drift to a certain extent, and some important performance parameters of the device generate irreversible deviation. Due to the existence of the process deviation, when the delay information of the comparison circuit after the hardware trojan is inserted is changed, the process deviation has different degrees of covering effect on the change of the delay characteristic caused by the insertion of the hardware trojan, and the influence of the hardware trojan on the circuit even can be submerged in the process deviation, namely, the process deviation and the influence of the hardware trojan on the circuit cannot be thoroughly distinguished and shown.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a distributed ring oscillator network layout filling hardware Trojan horse detection method and a circuit. The technical problem to be solved by the invention is realized by the following technical scheme:
a distributed ring oscillator network layout filling hardware Trojan horse detection method and a circuit thereof comprise:
acquiring a plurality of fragile nodes in a carrier circuit;
adding an initial detection circuit on the carrier circuit to obtain the carrier circuit added with the initial detection circuit;
setting a process deviation fluctuation range on the carrier circuit added with the initial detection circuit, and establishing a process library with process deviation fluctuation;
filling a ring oscillator network into the carrier circuit added with the initial detection circuit according to the fragile nodes to obtain a carrier circuit added with the detection circuit, and obtaining a first safety chip and a second safety chip according to the carrier circuit added with the detection circuit;
implanting a preset hardware trojan into the second safety chip to obtain a chip to be tested;
respectively carrying out dynamic simulation on the first security chip and the chip to be tested according to the process library with process deviation fluctuation to respectively obtain a security dynamic simulation result and a Trojan dynamic simulation result, and respectively constructing a security chip path delay information data set and a chip path delay information data set to be tested according to the security dynamic simulation result and the Trojan dynamic simulation result;
respectively extracting main characteristic components in the safe chip path delay information data set and the chip path delay information data set to be detected, and respectively performing dimensionality reduction on the main characteristic components to obtain safe low-dimensional data and low-dimensional data to be detected;
and carrying out comparative analysis on the safe low-dimensional data and the low-dimensional data to be detected to obtain an analysis result.
In one embodiment of the invention, acquiring a number of fragile nodes in a carrier circuit comprises:
generating a test vector by using Tetramax to perform dynamic simulation on the carrier circuit to obtain a dynamic simulation result;
obtaining a plurality of node turnover rates in the carrier circuit according to the dynamic simulation result;
and obtaining a plurality of fragile nodes according to the node turnover rates and a preset node turnover rate threshold value.
In an embodiment of the present invention, respectively performing dynamic simulation on the first secure chip and the chip to be tested according to the process library with process deviation fluctuation to obtain a secure dynamic simulation result and a Trojan dynamic simulation result, and respectively constructing a secure chip path delay information data set and a chip path delay information data set to be tested according to the secure dynamic simulation result and the Trojan dynamic simulation result, including:
the process library with the process deviation fluctuation is used for simulating the process deviation, and the first safety chip is dynamically simulated through test excitation to obtain a safety dynamic simulation result;
simulating the process deviation by using the process library with the process deviation fluctuation, and carrying out dynamic simulation on the chip to be tested through test excitation to obtain a Trojan dynamic simulation result;
constructing a safety chip path delay information data set according to the safety dynamic simulation result;
and constructing a path delay information data set of the chip to be tested according to the Trojan dynamic simulation result.
The invention also provides a distributed ring oscillator network layout filling hardware Trojan horse detection circuit, which comprises: the system comprises a linear shift register, a decoder, a data selector, a counter and a ring oscillator network;
a test excitation output end of the linear shift register sends test excitation to the ring oscillator network through a signal input end of the ring oscillator network;
the selection signal input end of the decoder inputs an external selection signal, and the signal output end of the decoder is connected with the enable ends of the ring oscillator networks to input an enable signal;
the external selection signal is also input to a selection signal input end of the data selector, the signal input end of the data selector is connected with the signal output ends of the ring oscillator networks, and the output end of the data selector is connected with the input end of the counter;
and the output end of the counter outputs a dynamic simulation result.
In one embodiment of the invention, the ring oscillator network comprises a number of ring oscillators, the ring oscillators comprising a nand gate, four inverters (I1, I2, I3, I4);
a first signal input end of the NAND gate is used as an enabling end of the ring oscillator network and connected with a signal output end of the decoder, and a second signal input end of the NAND gate is used as a signal input end of the ring oscillator network and connected with a test excitation output end of the linear shift register;
the signal output end of the nand gate is connected with the signal input end of the inverter I1, the signal output end of the inverter I1 is connected with the signal input end of the inverter I2, the signal output end of the inverter I2 is used as the signal output end of the ring oscillator network and is connected with the signal input end of the data selector, the signal input end of the inverter I3 is connected with the signal output end of the inverter I2, the signal input end of the inverter I4 is connected with the signal output end of the inverter I3, and the signal output end of the inverter I4 is connected with the second signal input end of the nand gate.
The invention has the beneficial effects that:
the method mainly detects the fragile nodes in the circuit, the ring oscillator network can be adjusted according to the specific circuit, the influence of process deviation on path delay information is considered, the precision and the detection accuracy of chip delay information are improved, and meanwhile, the positioning function of the hardware Trojan horse can be realized; the invention adopts a non-destructive method to detect the Trojan horse of the hardware on the chip; the ring oscillator network in the invention fills the blank area of the layout in the layout stage, thereby reducing the consumption of chip area.
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Drawings
Fig. 1 is a block diagram of a step of a distributed ring oscillator network layout filling hardware Trojan horse detection method according to an embodiment of the present invention;
fig. 2 is a circuit diagram of a distributed ring oscillator network layout filling hardware Trojan horse detection circuit provided in the embodiment of the present invention;
fig. 3 is a circuit diagram of a ring oscillator in another distributed ring oscillator network layout filling hardware Trojan horse detection circuit according to an embodiment of the present invention;
fig. 4 is a schematic diagram of another distributed ring oscillator network layout filling hardware Trojan horse detection circuit provided in the embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
Referring to fig. 1, fig. 1 is a block diagram of a method for detecting a Trojan horse in a distributed ring oscillator network layout filling hardware provided in an embodiment of the present invention, including:
acquiring a plurality of fragile nodes in a carrier circuit;
adding an initial detection circuit on the carrier circuit to obtain the carrier circuit added with the initial detection circuit;
setting a process deviation fluctuation range on the carrier circuit added with the initial detection circuit, and establishing a process library with process deviation fluctuation;
filling a ring oscillator network into the carrier circuit added with the initial detection circuit according to the fragile nodes to obtain a carrier circuit added with the detection circuit, and obtaining a first safety chip and a second safety chip according to the carrier circuit added with the detection circuit;
implanting a preset hardware trojan into the second safety chip to obtain a chip to be tested;
respectively carrying out dynamic simulation on the first security chip and the chip to be tested according to the process library with process deviation fluctuation to respectively obtain a security dynamic simulation result and a Trojan dynamic simulation result, and respectively constructing a security chip path delay information data set and a chip path delay information data set to be tested according to the security dynamic simulation result and the Trojan dynamic simulation result;
respectively extracting main characteristic components in the safe chip path delay information data set and the chip path delay information data set to be detected, and respectively performing dimensionality reduction on the main characteristic components to obtain safe low-dimensional data and low-dimensional data to be detected;
and carrying out comparative analysis on the safe low-dimensional data and the low-dimensional data to be detected to obtain an analysis result.
Further, the safety dynamic simulation result can be obtained in a simulation mode, and further a safety chip path delay information data set is obtained.
The path delay information data set of the security chip is obtained without actually producing the first security chip, so that the whole detection can be completed only by testing the chip to be detected, and the detection cost and the complexity are reduced.
Furthermore, when a plurality of ring oscillator networks are filled in the carrier circuit added with the initial detection circuit, the ring oscillator filled in the blank area of the layout can be searched in the area where the fragile nodes are densely distributed according to the distribution of the fragile nodes on the carrier circuit added with the initial detection circuit.
The method mainly detects the fragile nodes in the circuit, the ring oscillator network can be adjusted according to the specific circuit, the influence of process deviation on path delay information is considered, the precision and the detection accuracy of chip delay information are improved, and meanwhile, the positioning function of the hardware Trojan horse can be realized; the invention adopts a non-destructive method to detect the Trojan horse of the hardware on the chip; the ring oscillator network in the invention fills the blank area of the layout in the layout stage, thereby reducing the consumption of chip area.
In one embodiment of the invention, acquiring a number of fragile nodes in a carrier circuit comprises:
generating a test vector by using a Tetramax (automatic test excitation generation tool) to perform dynamic simulation on the carrier circuit to obtain a dynamic simulation result;
obtaining a plurality of node turnover rates in the carrier circuit according to the dynamic simulation result;
and obtaining a plurality of fragile nodes according to the node turnover rates and a preset node turnover rate threshold value.
In an embodiment of the present invention, respectively performing dynamic simulation on the first secure chip and the chip to be tested according to the process library with process deviation fluctuation to obtain a secure dynamic simulation result and a Trojan dynamic simulation result, and respectively constructing a secure chip path delay information data set and a chip path delay information data set to be tested according to the secure dynamic simulation result and the Trojan dynamic simulation result, including:
the process library with the process deviation fluctuation is used for simulating the process deviation, and the first security chip is dynamically simulated through test excitation patterns to obtain a security dynamic simulation result;
simulating the process deviation by using the process library with the process deviation fluctuation, and performing dynamic simulation on the chip to be tested through test excitation patterns to obtain a Trojan dynamic simulation result;
constructing a safety chip path delay information data set according to the safety dynamic simulation result;
and constructing a path delay information data set of the chip to be tested according to the Trojan dynamic simulation result.
Specifically, the process library of the process variation is used for simulating the influence of the change of the PVT (process, voltage and temperature) on the chip on the circuit delay
Referring to fig. 2, fig. 2 is a circuit diagram of a distributed ring oscillator network layout filling hardware Trojan detection circuit according to an embodiment of the present invention, including: the linear shift register LFSR, the Decoder Decoder, the data selector MUX, the Counter and the ring oscillator network;
a test excitation pattern output end of the linear shift register LFSR sends a test excitation pattern to the ring oscillator network through a signal input end of the ring oscillator network;
the selection signal input end of the Decoder inputs an external selection signal Select Bits, and the signal output end of the Decoder is connected with the enable end input enable signals of the ring oscillator networks;
the selection signal input end of the data selector MUX also inputs the external selection signal Select Bits, the signal input end of the data selector MUX is connected with the signal output ends of the ring oscillator networks, and the output end of the data selector MUX is connected with the input end of the Counter;
and the output end of the Counter outputs a dynamic simulation result and performs Data Analysis.
In an embodiment of the present invention, the ring oscillator network includes a plurality of ring oscillators, please refer to fig. 3, fig. 3 is a circuit diagram of a ring oscillator in another distributed ring oscillator network layout filling hardware Trojan detection circuit provided in the embodiment of the present invention, the ring oscillator includes a nand gate, four inverters (I1, I2, I3, I4);
a first signal input end of the nand gate is used as an enabling end of the ring oscillator network and connected with a signal output end of the Decoder, and a second signal input end of the nand gate is used as a signal input end of the ring oscillator network and connected with a test excitation pattern output end of the linear shift register LFSR;
the signal output end of the nand gate is connected with the signal input end of the inverter I1, the signal output end of the inverter I1 is connected with the signal input end of the inverter I2, the signal output end of the inverter I2 is used as the signal output end of the ring oscillator network and is connected with the signal input end of the data selector MUX, the signal input end of the inverter I3 is connected with the signal output end of the inverter I2, the signal input end of the inverter I4 is connected with the signal output end of the inverter I3, and the signal output end of the inverter I4 is connected with the second signal input end of the nand gate.
Specifically, in the detection process, it is ensured that the first security chip and the chip to be tested provide the same test excitation patterns; the Decoder and the data selector MUX are used for enabling a single ring oscillator network to be effective and correspondingly outputting the effective and corresponding output to the Counter at the same time, and selecting the next ring oscillator after the counting time is over until all ring oscillators are traversed; the Counter is used to count the output frequency of the ring oscillator network.
Further, referring to fig. 4, fig. 4 is a schematic diagram of another layout filling hardware Trojan horse detection circuit of a distributed Ring oscillator network according to an embodiment of the present invention, where the number of Power bars in the horizontal direction of a carrier circuit is 3, the number of Power bars in the vertical direction is 2, and the layout encloses a Ring of Power rings, the Power networks divide the layout into 12 regions, and each region is provided with a 5-stage Ring oscillator network, the number of Ring oscillator networks ROi (i ═ 1,2,3 …,12) is 12, and the number of Ring oscillator networks ROi (i ═ 1,2, …, N ═ 12), the enable end ENi (i ═ 1,2,3 …,12) of the Ring oscillator network, the signal output end OUTi (i ═ 1,2,3 …,12) of the Ring oscillator network, and the output oscillation frequency is fi (i ═ 1,2,3 …, 12).
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (5)

1.分布型环形振荡器网络版图填充硬件木马检测方法,其特征在于,包括:1. a distributed ring oscillator network layout filling hardware Trojan detection method is characterized in that, comprising: 获取载体电路中的若干脆弱节点;Obtain several vulnerable nodes in the carrier circuit; 在所述载体电路上添加初始检测电路得到添加初始检测电路的载体电路;adding an initial detection circuit to the carrier circuit to obtain a carrier circuit to which the initial detection circuit is added; 在所述添加初始检测电路的载体电路上设置工艺偏差波动范围,并建立具有工艺偏差波动的工艺库;Setting a process deviation fluctuation range on the carrier circuit added with the initial detection circuit, and establishing a process library with process deviation fluctuation; 根据所述若干脆弱节点向所述添加初始检测电路的载体电路内填充环形振荡器网络得到添加检测电路的载体电路,并根据所述添加检测电路的载体电路得到第一安全芯片和第二安全芯片;Fill the ring oscillator network into the carrier circuit with the initial detection circuit according to the several vulnerable nodes to obtain the carrier circuit with the detection circuit added, and obtain the first security chip and the second security chip according to the carrier circuit with the detection circuit added. ; 向所述第二安全芯片内植入预设硬件木马得到待测芯片;implanting a preset hardware Trojan into the second security chip to obtain a chip to be tested; 根据所述具有工艺偏差波动的工艺库分别对所述第一安全芯片和所述待测芯片进行动态仿真分别得到安全动态仿真结果和木马动态仿真结果,并根据所述安全动态仿真结果和所述木马动态仿真结果分别构建安全芯片路径延迟信息数据集和待测芯片路径延迟信息数据集;Dynamically simulate the first security chip and the chip to be tested according to the process library with process deviation fluctuations to obtain security dynamic simulation results and Trojan horse dynamic simulation results, respectively, and according to the security dynamic simulation results and the The dynamic simulation results of the Trojan horse build the security chip path delay information data set and the test chip path delay information data set respectively; 分别提取所述安全芯片路径延迟信息数据集和所述待测芯片路径延迟信息数据集中的主要特征分量,并将所述主要特征分量分别进行降维处理得到安全低维数据和待测低维数据;Extracting main feature components in the security chip path delay information data set and the under-test chip path delay information data set respectively, and performing dimension reduction processing on the main feature components to obtain secure low-dimensional data and low-dimensional data to be tested ; 对所述安全低维数据和所述待测低维数据进行对比分析得到分析结果。An analysis result is obtained by comparing and analyzing the safe low-dimensional data and the low-dimensional data to be tested. 2.根据权利要求1所述的分布型环形振荡器网络版图填充硬件木马检测方法,其特征在于,获取载体电路中的若干脆弱节点,包括:2. The distributed ring oscillator network layout filling hardware Trojan detection method according to claim 1, characterized in that, acquiring several vulnerable nodes in the carrier circuit, comprising: 使用Tetramax生成测试向量对载体电路进行动态仿真得到动态仿真结果;Use Tetramax to generate test vectors to dynamically simulate the carrier circuit to obtain dynamic simulation results; 根据所述动态仿真结果得到所述载体电路中的若干节点翻转率;According to the dynamic simulation result, several node turnover rates in the carrier circuit are obtained; 根据所述若干节点翻转率与预设节点翻转率阈值得到若干脆弱节点。Several vulnerable nodes are obtained according to the several node flipping rates and the preset node flipping rate threshold. 3.根据权利要求1所述的分布型环形振荡器网络版图填充硬件木马检测方法,其特征在于,根据所述具有工艺偏差波动的工艺库分别对所述第一安全芯片和所述待测芯片进行动态仿真分别得到安全动态仿真结果和木马动态仿真结果,并根据所述安全动态仿真结果和所述木马动态仿真结果分别构建安全芯片路径延迟信息数据集和待测芯片路径延迟信息数据集,包括:3. The distributed ring oscillator network layout filling hardware Trojan detection method according to claim 1, characterized in that, according to the process library with process deviation fluctuations, the first security chip and the chip to be tested are respectively detected Performing dynamic simulation to obtain security dynamic simulation results and Trojan horse dynamic simulation results, respectively, and constructing a security chip path delay information data set and a test chip path delay information data set respectively according to the security dynamic simulation results and the Trojan horse dynamic simulation results, including : 利用所述具有工艺偏差波动的工艺库模拟工艺偏差通过测试激励对所述第一安全芯片进行动态仿真得到安全动态仿真结果;Using the process library with process deviation fluctuations to simulate process deviations and performing dynamic simulation on the first security chip through test excitation to obtain a security dynamic simulation result; 利用所述具有工艺偏差波动的工艺库模拟工艺偏差通过测试激励对所述待测芯片进行动态仿真得到木马动态仿真结果;Using the process library with process deviation fluctuations to simulate process deviations, performing dynamic simulation on the chip to be tested through test excitation to obtain a Trojan horse dynamic simulation result; 根据所述安全动态仿真结果构建安全芯片路径延迟信息数据集;constructing a security chip path delay information data set according to the security dynamic simulation result; 根据所述木马动态仿真结果构建待测芯片路径延迟信息数据集。According to the dynamic simulation result of the Trojan horse, a data set of path delay information of the chip to be tested is constructed. 4.分布型环形振荡器网络版图填充硬件木马检测电路,其特征在于,包括:线性移位寄存器、译码器、数据选择器、计数器和环形振荡器网络;4. A distributed ring oscillator network layout filling hardware Trojan horse detection circuit, characterized in that it includes: a linear shift register, a decoder, a data selector, a counter and a ring oscillator network; 所述线性移位寄存器的测试激励输出端通过所述环形振荡器网络的信号输入端向所述环形振荡器网络发送测试激励;The test excitation output terminal of the linear shift register sends test excitation to the ring oscillator network through the signal input terminal of the ring oscillator network; 所述译码器的选择信号输入端输入外部选择信号,所述译码器的信号输出端连接所述若干环形振荡器网络的使能端输入使能信号;The selection signal input terminal of the decoder inputs an external selection signal, and the signal output terminal of the decoder is connected to the enable terminals of the plurality of ring oscillator networks to input the enable signal; 所述数据选择器的选择信号输入端也输入所述外部选择信号,所述数据选择器的信号输入端与所述若干环形振荡器网络的信号输出端,所述数据选择器的输出端连接所述计数器的输入端;The selection signal input terminal of the data selector also inputs the external selection signal, the signal input terminal of the data selector is connected to the signal output terminals of the plurality of ring oscillator networks, and the output terminal of the data selector is connected to the the input of the counter; 所述计数器的输出端输出动态仿真结果。The output terminal of the counter outputs the dynamic simulation result. 5.根据权利要求4所述的分布型环形振荡器网络版图填充硬件木马检测电路,其特征在于,所述环形振荡器网络包括若干环形振荡器,所述环形振荡器包括与非门、四个反相器(I1、I2、I3、I4);5. The distributed ring oscillator network layout filling hardware Trojan detection circuit according to claim 4, wherein the ring oscillator network comprises a plurality of ring oscillators, and the ring oscillator comprises a NAND gate, four Inverter (I1, I2, I3, I4); 所述与非门的第一信号输入端作为所述环形振荡器网络的使能端连接所述译码器的信号输出端,所述与非门的第二信号输入端作为所述环形振荡器网络的信号输入端与所述线性移位寄存器的测试激励输出端连接;The first signal input terminal of the NAND gate is used as the enabling terminal of the ring oscillator network to connect to the signal output terminal of the decoder, and the second signal input terminal of the NAND gate is used as the ring oscillator. The signal input end of the network is connected with the test excitation output end of the linear shift register; 所述与非门的信号输出端连接所述反相器I1的信号输入端,所述反相器I1的信号输出端连接所述反相器I2的信号输入端,所述反相器I2的信号输出端作为所述环形振荡器网络的信号输出端与所述数据选择器的信号输入端连接,所述反相器I3的信号输入端连接所述反相器I2的信号输出端,所述反相器I4的信号输入端连接所述反相器I3的信号输出端,所述反相器I4的信号输出端连接所述与非门的第二信号输入端。The signal output end of the NAND gate is connected to the signal input end of the inverter I1, the signal output end of the inverter I1 is connected to the signal input end of the inverter I2, and the signal output end of the inverter I2 is connected. The signal output terminal is connected to the signal input terminal of the data selector as the signal output terminal of the ring oscillator network, the signal input terminal of the inverter I3 is connected to the signal output terminal of the inverter I2, and the The signal input end of the inverter I4 is connected to the signal output end of the inverter I3, and the signal output end of the inverter I4 is connected to the second signal input end of the NAND gate.
CN202010042795.8A 2020-01-15 2020-01-15 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit Pending CN111208415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010042795.8A CN111208415A (en) 2020-01-15 2020-01-15 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010042795.8A CN111208415A (en) 2020-01-15 2020-01-15 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit

Publications (1)

Publication Number Publication Date
CN111208415A true CN111208415A (en) 2020-05-29

Family

ID=70789703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010042795.8A Pending CN111208415A (en) 2020-01-15 2020-01-15 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit

Country Status (1)

Country Link
CN (1) CN111208415A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487504A (en) * 2020-12-15 2021-03-12 电子科技大学 Hardware Trojan horse detection optimization technology based on annular oscillator
CN114386109A (en) * 2021-12-23 2022-04-22 中国电子科技集团公司第三十研究所 A process deviation measurement method for hardware Trojan detection
CN114639610A (en) * 2020-12-15 2022-06-17 长鑫存储技术有限公司 Process corner detection circuit and process corner detection method
CN118643677A (en) * 2024-08-13 2024-09-13 杭州广立微电子股份有限公司 Chip surface morphology simulation method, device and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372539A (en) * 2016-08-31 2017-02-01 电子科技大学 Frequency-variable ring oscillator PUF (Physical Unclonable Function) circuit
CN106771960A (en) * 2016-11-18 2017-05-31 天津大学 The generation of local test vector and optimization method based on ring oscillator network
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan Detection Method Based on Path Delay Fingerprint
CN110210258A (en) * 2019-05-10 2019-09-06 中国人民解放军国防科技大学 Device, method and detection method for chip netlist level confusion defense hardware trojan
CN110598399A (en) * 2019-08-27 2019-12-20 天津大学 Hardware Trojan horse detection device and method based on weak same path

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372539A (en) * 2016-08-31 2017-02-01 电子科技大学 Frequency-variable ring oscillator PUF (Physical Unclonable Function) circuit
CN106771960A (en) * 2016-11-18 2017-05-31 天津大学 The generation of local test vector and optimization method based on ring oscillator network
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan Detection Method Based on Path Delay Fingerprint
CN110210258A (en) * 2019-05-10 2019-09-06 中国人民解放军国防科技大学 Device, method and detection method for chip netlist level confusion defense hardware trojan
CN110598399A (en) * 2019-08-27 2019-12-20 天津大学 Hardware Trojan horse detection device and method based on weak same path

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘海亮: "基于特征提取的硬件木马检测技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487504A (en) * 2020-12-15 2021-03-12 电子科技大学 Hardware Trojan horse detection optimization technology based on annular oscillator
CN112487504B (en) * 2020-12-15 2022-04-22 电子科技大学 An optimization method for hardware Trojan detection based on ring oscillator
CN114639610A (en) * 2020-12-15 2022-06-17 长鑫存储技术有限公司 Process corner detection circuit and process corner detection method
CN114639610B (en) * 2020-12-15 2024-06-07 长鑫存储技术有限公司 Process corner detection circuit and process corner detection method
CN114386109A (en) * 2021-12-23 2022-04-22 中国电子科技集团公司第三十研究所 A process deviation measurement method for hardware Trojan detection
CN118643677A (en) * 2024-08-13 2024-09-13 杭州广立微电子股份有限公司 Chip surface morphology simulation method, device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN111208415A (en) Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit
US10794952B2 (en) Product performance test binning
CN111027270B (en) Method and circuit for trusted design of integrated circuit design flow
Zheng et al. DScanPUF: A delay-based physical unclonable function built into scan chain
US10691855B2 (en) Device and method for detecting points of failures
Yu et al. An improved automatic hardware trojan generation platform
US11411749B2 (en) System and method for performing netlist obfuscation for a semiconductor device
CN104636686B (en) The circuit design method and the detection method to hardware Trojan horse of raising hardware Trojan horse detection resolution based on gated clock
Mondal et al. A new online testing technique for reversible circuits
CN108333501A (en) Hardware Trojan horse bypass detection method and device and simulation verification method and device
Kareem et al. Towards performance optimization of ring oscillator PUF using Xilinx FPGA
Huang Diagnosis of Byzantine open-segment faults [scan testing]
US11907631B2 (en) Reset domain crossing detection and simulation
Gunti et al. Effective usage of redundancy to aid neutralization of hardware Trojans in Integrated Circuits
Mustapa et al. Frequency uniqueness in ring oscillator Physical Unclonable Functions on FPGAs
Carriero et al. Linda in heterogeneous computing environments
Mondal et al. Hardware Trojan detection using transition probability with minimal test vectors
Deepthi Hardware trojan detection using ring oscillator
Saqib et al. ASIC implementation of a hardware‐embedded physical unclonable function
Kumar et al. Fault diagnosis using automatic test pattern generation and test power reduction technique for VLSI circuits
US10878132B2 (en) Logic device for detecting faults
Xu et al. Digital PUF using intentional faults
Abinandhan et al. Application Specific Testing for VLSI Benchmark Circuits
Polian Test and reliability challenges for approximate circuitry
Giridharan et al. A MUX based Latch Technique for the detection of HardwareTrojan using Path Delay Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200529

RJ01 Rejection of invention patent application after publication