基于可信設(shè)計(jì)流程的方法研究
[Abstract]:With the rapid development of integrated circuit industry in our country and the deepening of integrated circuit products into our daily life, the research on credibility method based on integrated circuit design process has become a leading research topic. The research of credibility design method mainly involves two aspects: design flow and credibility. Based on the design flow of integrated circuit, this paper analyzes the structure and working characteristics of RTL level hardware Trojan horse, and studies the DFT technology that runs through the whole design process. How to use DFT technology to detect and determine the location of hardware Trojan horse is put forward. The main contents of this paper are as follows: first, the structural characteristics and working characteristics of the hardware Trojan horse are analyzed in detail, and the detection methods of the hardware Trojan horse are analyzed, compared and summarized. Then the advantages and disadvantages of each detection method are listed. Secondly, the work and structure characteristics of RTL level hardware Trojan horse are deeply studied. By analyzing the structural characteristics of RTL level hardware Trojan horse based on Verilog language and the analysis of AES reference circuit, the trusted model of RTL level hardware Trojan horse detection is established. The detection method of RTL level hardware Trojan horse is proposed and verified by other Trojans designed by other attackers. This method is not only simple and effective, but also makes up for the shortcomings of traditional detection methods and UCI detection methods. Thirdly, the testability design technology and its implementation stages are deeply studied, and the hardware Trojan horse detection method based on DFT technology is proposed. Through the analysis of the data before and after the reference circuit is inserted into the scanning chain, it is found that the insertion of the scan chain can amplify the activity of the hardware Trojan horse more than 1.4 times. By comparing the parameters before and after the activation of scanning chain under different processes, it is found that the insertion of scanning chain under SMIC130nm process improves the detection accuracy of Trojan horse by 65% and 49% under SMIC90nm condition. Finally, the causes of the change of results are analyzed in detail, and the location method of hardware Trojan horse is further put forward. Fourth, the hardware Trojan horse location technology based on DFT technology is further analyzed. Firstly, the whole process of the experiment and the different Trojan horse structures used are described, and then by adding different number of scanning chains, By analyzing the influence of local activation and global activation of scan chain on the circuit, it is found that activating the scan chain containing Trojan horse alone can increase the overall average power consumption of the circuit by more than 1.7 times and the peak power consumption by more than 1.8 times. The experimental results show that the approximate location of the hardware Trojan horse can be found by this method.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN402
【參考文獻(xiàn)】
相關(guān)期刊論文 前7條
1 趙志勛;倪林;李少青;;硬件木馬電路功耗的檢測(cè)方法[J];北京郵電大學(xué)學(xué)報(bào);2015年04期
2 張鵬;王新成;周慶;;基于投影尋蹤分析的芯片硬件木馬檢測(cè)[J];通信學(xué)報(bào);2013年04期
3 劉長(zhǎng)龍;趙毅強(qiáng);史亞峰;馮紫竹;;基于側(cè)信道分析的硬件木馬建模與優(yōu)化[J];華中科技大學(xué)學(xué)報(bào)(自然科學(xué)版);2013年02期
4 鄭朝霞;韓玲;李陽(yáng);鄒雪城;;一種木馬電路的實(shí)現(xiàn)與特征分析[J];微電子學(xué)與計(jì)算機(jī);2012年10期
5 鄒程;張鵬;鄧高明;吳恒旭;;基于功率旁路泄露的硬件木馬設(shè)計(jì)[J];計(jì)算機(jī)工程;2011年11期
6 張鵬;鄒程;鄧高明;陳開(kāi)顏;;基于電磁泄漏相關(guān)性分析的硬件木馬設(shè)計(jì)[J];華中科技大學(xué)學(xué)報(bào)(自然科學(xué)版);2010年10期
7 陳開(kāi)顏;趙強(qiáng);張鵬;周開(kāi)民;;集成電路芯片信息泄漏旁路分析模型[J];微計(jì)算機(jī)信息;2006年16期
相關(guān)博士學(xué)位論文 前1條
1 高洪博;指令誘發(fā)型硬件木馬檢測(cè)技術(shù)研究[D];解放軍信息工程大學(xué);2013年
相關(guān)碩士學(xué)位論文 前1條
1 房磊;基于門級(jí)網(wǎng)表的硬件木馬檢測(cè)技術(shù)研究[D];電子科技大學(xué);2014年
,本文編號(hào):2497222
本文鏈接:http://sikaile.net/kejilunwen/dianzigongchenglunwen/2497222.html