[go: up one dir, main page]

CN110598399A - Hardware Trojan horse detection device and method based on weak same path - Google Patents

Hardware Trojan horse detection device and method based on weak same path Download PDF

Info

Publication number
CN110598399A
CN110598399A CN201910798534.6A CN201910798534A CN110598399A CN 110598399 A CN110598399 A CN 110598399A CN 201910798534 A CN201910798534 A CN 201910798534A CN 110598399 A CN110598399 A CN 110598399A
Authority
CN
China
Prior art keywords
path
delay
gate
trojan
circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910798534.6A
Other languages
Chinese (zh)
Other versions
CN110598399B (en
Inventor
李宗哲
赵毅强
秦国轩
刘燕江
何家骥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201910798534.6A priority Critical patent/CN110598399B/en
Publication of CN110598399A publication Critical patent/CN110598399A/en
Application granted granted Critical
Publication of CN110598399B publication Critical patent/CN110598399B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明属于集成电路硬件木马检测方法领域,为快速有效地检测弱相同路径上的延时信息,降低芯片检测的复杂度和成本,除去了工艺偏差的影响,本发明基于弱相同路径的硬件木马检测装置和方法,步骤如下:1)对集成电路版图进行静态时序分析,确定路径以及延迟信息:2)设定弱相同路径延迟阈值,分析并确定弱相同路径集合R:3)分析弱相同路径的敏感性,筛选弱相同路径集合:4)植入多环路片上延迟木马自检测结构,分析有效性:5)对芯片制造后路径的延迟信息进行测试;6)将延迟信息的差值进行对比,判断出疑似植入木马的路径。本发明主要应用于集成电路设计制造场合。

The invention belongs to the field of integrated circuit hardware Trojan detection methods. In order to quickly and effectively detect delay information on weakly identical paths, reduce the complexity and cost of chip detection, and remove the influence of process deviations, the present invention is based on the hardware Trojans of weakly identical paths. The detection device and method, the steps are as follows: 1) perform static timing analysis on the layout of the integrated circuit, and determine the path and delay information: 2) set the weak identical path delay threshold, analyze and determine the weak identical path set R: 3) analyze the weak identical path Sensitivity, screening weak identical path sets: 4) Implant multi-loop on-chip delay Trojan self-detection structure to analyze effectiveness: 5) Test the delay information of the paths after chip fabrication; 6) Measure the difference between the delay information Contrast and determine the path of the suspected implanted Trojan. The present invention is mainly applied to the occasion of integrated circuit design and manufacture.

Description

基于弱相同路径的硬件木马检测装置和方法Hardware Trojan Detection Device and Method Based on Weak Same Path

技术领域technical field

本发明属于集成电路硬件木马检测方法领域,具体涉及一种基于弱相同路径的硬件木马检测方法。The invention belongs to the field of integrated circuit hardware Trojan horse detection methods, in particular to a hardware Trojan horse detection method based on weak identical paths.

背景技术Background technique

集成电路(Integrated Circuits,IC),作为生活中各种电子产品的核心,已经广泛地应用于移动通讯、卫星通讯、航空航天等各个方面。生产出一块合格的芯片大致需要四个环节:集成电路设计、制造、测试及封装。由于完成各个环节的费用十分昂贵,技术体系十分庞大并且复杂,使得各个环节相分离,彼此单独进行。因此,用户使用的芯片在制造过程中被硬件黑客植入木马的可能性变大,由此将引发芯片的安全问题。这些安全问题主要表现为增加芯片功耗、窃取用户信息、使芯片瘫痪等。硬件木马的植入对信息安全领域是一个严峻的挑战。因此,开展集成电路硬件木马检测方法研究是十分必要的。Integrated Circuits (IC), as the core of various electronic products in life, have been widely used in various aspects such as mobile communication, satellite communication, aerospace and so on. To produce a qualified chip roughly requires four links: integrated circuit design, manufacturing, testing and packaging. Because the cost of completing each link is very expensive, and the technical system is very large and complex, each link is separated and carried out independently of each other. Therefore, the chips used by users are more likely to be implanted by hardware hackers into Trojan horses during the manufacturing process, which will cause chip security issues. These security problems are mainly manifested in increasing chip power consumption, stealing user information, and paralyzing the chip. The implantation of hardware Trojans is a serious challenge to the field of information security. Therefore, it is very necessary to carry out research on the detection method of integrated circuit hardware Trojans.

硬件木马检测方法主要包括失效分析、逻辑测试和侧信道分析。失效分析属于破坏性物理检测方法,使用电子显微镜提取出版图结构,从而提取出网表,通过对比网表从而判断出是否具有木马,这是最直接也是精确度比较高的检测方法。然而,随着集成电路规模的增大,这种方法需要高精度显微镜以及高精度的匹配光刻板,而且电路规模越大,需要机械打磨或其他处理的工作量就越大。因此,这种方法只适用于少量芯片的抽样检测,难以批量化测试大规模电路。逻辑测试主要通过对测试向量在输出接口的输出结果与设计时的预期是否一致来判断纯净电路是否被篡改。这种检测方法的准确性很高,但是缺点是对于大规模电路而言,测试时很难激活木马电路的有效载荷部分。侧信道分析技术利用纯净电路与待测电路的侧信道信息区分待测电路是否含有木马,侧信道分析技术成本低、检测速度快,逐渐成为硬件木马检测方法的主流。侧信道信息包括功耗、电磁、路径延迟、光和温度等,相比其他侧信道信息,路径延迟信息具有无需硬件木马激活,受工艺偏差影响小,含有位置信息等优点,基于路径延迟的硬件木马检测技术受到了广泛的关注。Hardware Trojan detection methods mainly include failure analysis, logic testing and side channel analysis. Failure analysis is a destructive physical detection method. It uses an electron microscope to extract the published graph structure to extract the netlist, and compares the netlist to determine whether there is a Trojan horse. This is the most direct and accurate detection method. However, as the scale of integrated circuits increases, this approach requires high-precision microscopes as well as high-precision matching reticles, and the larger the circuit scale, the greater the effort required for mechanical grinding or other processing. Therefore, this method is only suitable for sampling inspection of a small number of chips, and it is difficult to test large-scale circuits in batches. The logic test mainly judges whether the pure circuit has been tampered by whether the output result of the test vector at the output interface is consistent with the design expectation. The accuracy of this detection method is high, but the disadvantage is that for large-scale circuits, it is difficult to activate the payload part of the Trojan circuit during testing. Side channel analysis technology uses the side channel information of the pure circuit and the circuit under test to distinguish whether the circuit under test contains Trojan horses. The side channel analysis technology has low cost and fast detection speed, and has gradually become the mainstream of hardware Trojan horse detection methods. Side channel information includes power consumption, electromagnetic, path delay, light and temperature, etc. Compared with other side channel information, path delay information has the advantages of not requiring hardware Trojan horse activation, less affected by process deviation, and containing location information. Path delay-based hardware Trojan detection technology has received extensive attention.

基于路径延迟的侧信道分析技术通过在芯片中插入影子寄存器或者时间数字转换器测量路径的延迟信息。将原始电路的延迟信息与待测电路的延迟信息进行对比从而检测木马。由于芯片中电路路径多,植入影子寄存器或者时间数字转换器会显著增加芯片面积,提高功耗。此外,侧信道分析技术需要测量原始电路的延迟信息作为黄金模型,建立黄金模型的过程十分复杂,增加了硬件木马的检测成本。Path delay-based side-channel analysis techniques measure path delay information by inserting shadow registers or time-to-digital converters in the chip. The delay information of the original circuit is compared with the delay information of the circuit under test to detect the Trojan. Since there are many circuit paths in the chip, implanting shadow registers or time-to-digital converters will significantly increase the chip area and increase power consumption. In addition, the side-channel analysis technology needs to measure the delay information of the original circuit as the golden model. The process of establishing the golden model is very complicated, which increases the detection cost of hardware Trojans.

因此,本发明提出了一种基于弱相同路径的硬件木马检测方法,依据电路的应用背景筛选电路的弱相同路径,作为待检测路径。在芯片的空白区域插入多环路片上延迟木马自检测结构。在测试阶段,通过收集多环路片上延迟木马自检测结构的延迟信息,并与预设的延迟信息进行比较,实现硬件木马的检测。该方法对同一芯片内路径延迟信息的差值进行比较,可以有效降低工艺偏差对测量结果的影响,另外本方法不需要建立黄金模型,降低了硬件木马检测的复杂度和检测成本,保证了集成电路在应用阶段的安全性,具有一定的实际意义和应用价值。Therefore, the present invention proposes a hardware Trojan detection method based on the weak identical path, which selects the weak identical path of the circuit as the path to be detected according to the application background of the circuit. Insert a multi-loop on-chip delay Trojan self-detection structure in a blank area of the chip. In the test phase, the hardware Trojan detection is realized by collecting the delay information of the multi-loop on-chip delay Trojan self-detection structure and comparing it with the preset delay information. The method compares the difference of path delay information in the same chip, which can effectively reduce the influence of process deviation on the measurement results. In addition, this method does not need to establish a golden model, which reduces the complexity and detection cost of hardware Trojan detection, and ensures the integration of The safety of the circuit in the application stage has certain practical significance and application value.

(一)参考文献(1) References

[1]Cha B,Gupta S K.[IEEE Conference Publications Design Automationand Test in Europe-Grenoble,France(2013.03.18-2013.03.22)]Design,Automation&Test in Europe Conference&Exhibition(DATE),2013-Trojan Detection via DelayMeasurements:ANew Approach to Select Paths and Vectors to MaximizeEffectiveness and Minimize Cost[J].2013:1265-1270.[1]Cha B,Gupta S K.[IEEE Conference Publications Design Automationand Test in Europe-Grenoble,France(2013.03.18-2013.03.22)]Design,Automation&Test in Europe Conference&Exhibition(DATE),2013-Trojan Detection via DelayMeasurements: ANew Approach to Select Paths and Vectors to MaximizeEffectiveness and Minimize Cost[J].2013:1265-1270.

[2]Lamech C,Plusquellic J.Trojan detection based on delay variationsmeasured using a high-precision,low-overhead embedded test structure[C]//IEEEInternational Symposium on Hardware-oriented Security&Trust.IEEE,2012.[2] Lamech C, Plusquellic J. Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure [C]//IEEE International Symposium on Hardware-oriented Security&Trust.IEEE, 2012.

[3]Exurville I,Zussa,Rigaud J B et al.Resilient hardware Trojansdetection based on path delay measurements[C]//IEEE International Symposiumon Hardware Oriented Security&Trust.IEEE,2015.[3]Exurville I, Zussa,Rigaud JB et al.Resilient hardware Trojansdetection based on path delay measurements[C]//IEEE International Symposiumon Hardware Oriented Security&Trust.IEEE,2015.

[4]Hao X,Saiyu R.Hardware Trojan detection by timing measurement:Theory and implementation[J].Microelectronics Journal,2018,77:16-25.[4]Hao X,Saiyu R.Hardware Trojan detection by timing measurement:Theory and implementation[J].Microelectronics Journal,2018,77:16-25.

[5]Xiao K,Zhang X,Tehranipoor M.A Clock Sweeping Technique forDetecting Hardware Trojans Impacting Circuits Delay[J].IEEE Design&Test,2013,30(2):26-34.[5] Xiao K, Zhang X, Tehranipoor M.A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay[J].IEEE Design&Test,2013,30(2):26-34.

发明内容SUMMARY OF THE INVENTION

为克服现有技术的不足,本发明旨在提出一种基于弱相同路径的多环路片上延迟木马自检测结构,该结构能够快速有效地检测弱相同路径上的延时信息,并与仿真结果进行对比,不需要建立黄金模型,降低了芯片检测的复杂度和成本,通过对比路径延时的差值,除去了工艺偏差的影响。为此,本发明采取的技术方案是,基于弱相同路径的硬件木马检测方法,步骤如下:In order to overcome the deficiencies of the prior art, the present invention aims to propose a multi-loop on-chip delay Trojan self-detection structure based on the weak identical path, which can quickly and effectively detect the delay information on the weak identical path, and compare it with the simulation results. For comparison, there is no need to establish a golden model, which reduces the complexity and cost of chip inspection, and removes the influence of process deviation by comparing the difference in path delay. For this reason, the technical solution adopted by the present invention is a hardware Trojan detection method based on weak identical paths, and the steps are as follows:

1)对集成电路版图进行静态时序分析,确定路径以及延迟信息:1) Perform static timing analysis on the layout of the integrated circuit to determine the path and delay information:

对电路版图进行静态时序分析,提取电路版图的网表并分析筛选出所有的路径信息,最后确定各路径的延迟信息t;Perform static timing analysis on the circuit layout, extract the netlist of the circuit layout, analyze and filter out all path information, and finally determine the delay information t of each path;

2)设定弱相同路径延迟阈值,分析并确定弱相同路径集合R:2) Set the weak identical path delay threshold, analyze and determine the weak identical path set R:

读取出网表中的路径以及延迟信息,依据已设定的路径延迟阈值,筛选出延迟信息的差值在一定范围内的若干条路径,将其确定为弱相同路径集合R={li,ti},i=1,2,3...,集合中li代表路径,ti代表该路径对应的延时;Read out the path and delay information in the netlist, and filter out several paths with the delay information difference within a certain range according to the set path delay threshold, and determine them as the weakly identical path set R={li i , t i }, i=1, 2, 3..., li in the set represents the path, and t i represents the delay corresponding to the path;

3)分析弱相同路径的敏感性,筛选弱相同路径集合:3) Analyze the sensitivity of weakly identical paths, and screen the set of weakly identical paths:

依据电路应用背景,对电路路径进行安全属性划分,根据安全等级,确定电路的敏感路径,并集中选择与之匹配的弱相同路径集,形成弱相同敏感路径集R1={lk,tk},k=1,2,3...,集合中lk代表敏感路径,tk代表该路径对应的延时;According to the application background of the circuit, the security attributes of the circuit paths are divided, and the sensitive paths of the circuit are determined according to the security level, and the weakly identical path set that matches it is selected centrally to form the weakly identical sensitive path set R1={l k ,t k } , k =1, 2, 3..., lk represents the sensitive path in the set, and t k represents the delay corresponding to the path;

4)植入多环路片上延迟木马自检测结构,分析有效性:4) Implant the multi-loop on-chip delay Trojan self-detection structure to analyze the effectiveness:

在电路的空白区域,植入多环路片上延迟木马自检测结构,并通过模拟仿真对植入的自检测结构的有效性进行评估,确定电路能否有效地输出延迟信息;In the blank area of the circuit, implant a multi-loop on-chip delay Trojan self-detection structure, and evaluate the effectiveness of the implanted self-detection structure through simulation to determine whether the circuit can effectively output delay information;

5)对芯片制造后路径的延迟信息进行测试:5) Test the delay information of the path after the chip is fabricated:

使用植入的多环路片上延迟木马自检测结构,测试所选择的弱相同路径集合上的延迟信息tk',并求出延迟信息的差值Δt';Use the implanted multi-loop on-chip delay Trojan self-detection structure to test the delay information t k ' on the selected weakly identical path set, and obtain the difference Δt' of the delay information;

6)将延迟信息的差值进行对比,判断出疑似植入木马的路径:6) Compare the difference between the delay information and determine the path of the suspected Trojan horse implantation:

将芯片制造前通过网表得到的延迟信息的差值Δt与制造后通过片上自检测结构得到的弱相同路径延迟信息的差值Δt'进行对比,判断出疑似植入木马的路径。The difference Δt of the delay information obtained through the netlist before chip fabrication is compared with the difference Δt' of the weak identical path delay information obtained through the on-chip self-checking structure after fabrication, and the path suspected of implanting a Trojan is determined.

多环路片上延迟木马自检测结构包括:多频信号生成模块,与非门n1、多路选择器MU1、非门n2、非门n3构成环路L1,与非门n4、多路选择器MU1、非门n2、非门n3、非门n5、非门n6构成环路L2,与非门n7、多路选择器MU1、非门n2、非门n3、非门n5、非门n6、非门n8、非门n9构成环路L3;通过与非门n1、n4、n7的输入端EN1、EN2、EN3输入电平信号,通过多路选择器MU1选择导通的环路,由于三条环路上门延迟时间不同,因此选择不同的环路会在多路选择器MU1输出端A点产生不同频率的信号,此信号为检测信号;Multi-loop on-chip delay Trojan self-detection structure includes: multi-frequency signal generation module, NAND gate n1, multiplexer MU1, NOT gate n2, NOT gate n3 to form loop L1, NAND gate n4, multiplexer MU1 , NOT gate n2, NOT gate n3, NOT gate n5, NOT gate n6 form a loop L2, NAND gate n7, multiplexer MU1, NOT gate n2, NOT gate n3, NOT gate n5, NOT gate n6, NOT gate n8 and NOT gate n9 form a loop L3; input level signals through the input terminals EN1, EN2, EN3 of NAND gates n1, n4, n7, and select the conducting loop through the multiplexer MU1, because the three loops are gated The delay time is different, so selecting different loops will generate signals of different frequencies at point A of the output terminal A of the multiplexer MU1, which is the detection signal;

对于多条待测电路构成的弱相同路径,检测信号通过传输门TH1、TH2...THm、THn植入待测电路的相应位置,当待测电路正常工作时,传输门关闭;当处于测试状态时,传输门导通,检测信号在弱相同路径上传递;For the weak identical paths formed by multiple circuits to be tested, the detection signal is implanted into the corresponding position of the circuit to be tested through the transmission gates TH1, TH2...THm, THn. When the circuit to be tested is working normally, the transmission gate is closed; In the state, the transmission gate is turned on, and the detection signal is transmitted on the weak same path;

路径选择模块通过多路选择器MU2选择两条需要测试的弱相同路径,并将测试路径输出的测试信号传递给异或门,异或门将两条路径上的信号异或,通过异或门输出的高电平信号的宽度,得到路径传输时间的差值。The path selection module selects two weak identical paths that need to be tested through the multiplexer MU2, and transmits the test signal output by the test path to the XOR gate. The XOR gate XORs the signals on the two paths and outputs it through the XOR gate. The width of the high-level signal is obtained, and the difference of the path transmission time is obtained.

本发明的特点及有益效果是:The characteristics and beneficial effects of the present invention are:

(1)本发明基于路径延迟信息进行硬件木马检测,将流片后路径的延迟信息与流片前的仿真结果进行对比,不需要测量原始电路的延迟信息,降低了硬件木马检测的复杂度。(1) The present invention performs hardware Trojan detection based on path delay information, compares the delay information of the path after tape-out with the simulation results before tape-out, does not need to measure the delay information of the original circuit, and reduces the complexity of hardware Trojan detection.

(2)本发明对同一芯片流片前与流片后弱相同路径延迟信息的差值进行对比,有效地避免了流片过程中的工艺偏差对测试结果的影响,提高了硬件木马检测的准确度。(2) The present invention compares the difference between the delay information of the weak same path before and after the tape-out of the same chip, which effectively avoids the influence of the process deviation in the tape-out process on the test result, and improves the accuracy of hardware Trojan detection. Spend.

(3)本发明提出了一种多环路片上延迟木马自检测结构,可以实现对若干条弱相同路径的快速检测,不需要在电路中重复植入多个相同检测电路,节约了电路面积,降低了成本。(3) The present invention proposes a multi-loop on-chip delay Trojan self-detection structure, which can realize rapid detection of several weakly identical paths, without repeatedly implanting multiple identical detection circuits in the circuit, saving circuit area, Reduced costs.

附图说明:Description of drawings:

图1木马检测流程图。Figure 1 Trojan detection flow chart.

图2多环路片上延迟木马自检测结构。Figure 2 Multi-loop on-chip delay Trojan self-detection structure.

图3弱相同路径。Figure 3 Weak identical paths.

图4植入木马后的弱相同路径。Figure 4. Weak identical pathways after implantation of Trojan horses.

图5A、B、C、D点的时序信息。Timing information of points A, B, C, and D in Figure 5.

具体实施方式Detailed ways

传统的基于路径的硬件木马检测方法需要测量并对比大量原始电路的延迟信息,检测效率低,成本较高,而且制造过程中存在工艺偏差,导致路径延迟的实际值与理论值存在偏差,严重降低了木马检测的准确性。针对芯片制造过程中容易被植入木马的问题,本发明提出了一种基于弱相同路径的多环路片上延迟木马自检测结构,该结构能够快速有效地检测弱相同路径上的延时信息,并与仿真结果进行对比,不需要建立黄金模型,降低了芯片检测的复杂度和成本,通过对比路径延时的差值,除去了工艺偏差的影响。The traditional path-based hardware Trojan detection method needs to measure and compare the delay information of a large number of original circuits, the detection efficiency is low, the cost is high, and there are process deviations in the manufacturing process, resulting in a deviation between the actual value of the path delay and the theoretical value, which is seriously reduced. the accuracy of Trojan detection. Aiming at the problem that Trojans are easily implanted in the chip manufacturing process, the present invention proposes a multi-loop on-chip delay Trojan self-detection structure based on weak identical paths, which can quickly and effectively detect delay information on weak identical paths. Compared with the simulation results, there is no need to establish a golden model, which reduces the complexity and cost of chip inspection. By comparing the difference in path delay, the influence of process deviation is removed.

侧信道硬件木马检测技术是通过收集并对比电路的侧信道信息,例如功耗、电磁、电路延时等,判断电路中是否植入了硬件木马的技术。相对于基于电磁和功耗信息的硬件木马检测,基于延迟信息的硬件木马检测技术的优点是无需激活电路中的木马,受工艺偏差的影响小以及含有位置信息等。即使电路中植入的木马未被激活,也会使植入路径上的延迟信息发生显著的改变。The side-channel hardware Trojan detection technology is a technology to determine whether a hardware Trojan is implanted in the circuit by collecting and comparing the side-channel information of the circuit, such as power consumption, electromagnetic, circuit delay, etc. Compared with the hardware Trojan detection based on electromagnetic and power consumption information, the advantages of the hardware Trojan detection technology based on delay information are that it does not need to activate the Trojan in the circuit, is less affected by process deviation, and contains location information. Even if the implanted Trojan horse in the circuit is not activated, the delay information on the implanted path changes significantly.

本发明的完整技术方案如图1所示,解释如下:The complete technical scheme of the present invention is shown in Figure 1 and explained as follows:

1)对集成电路版图进行静态时序分析,确定路径以及延迟信息:1) Perform static timing analysis on the layout of the integrated circuit to determine the path and delay information:

对电路版图进行静态时序分析,提取电路版图的网表并分析筛选出所有的路径信息,最后确定各路径的延迟信息t。Perform static timing analysis on the circuit layout, extract the netlist of the circuit layout, analyze and filter out all path information, and finally determine the delay information t of each path.

2)设定弱相同路径延迟阈值,分析并确定弱相同路径集合R:2) Set the weak identical path delay threshold, analyze and determine the weak identical path set R:

读取出网表中的路径以及延迟信息,依据已设定的路径延迟阈值,筛选出延迟信息的差值在一定范围内的若干条路径,将其确定为弱相同路径集合R={li,ti},i=1,2,3...,集合中li代表路径,ti代表该路径对应的延时。Read out the path and delay information in the netlist, and filter out several paths with the delay information difference within a certain range according to the set path delay threshold, and determine them as the weakly identical path set R={li i , t i }, i=1, 2, 3..., li in the set represents a path, and t i represents the delay corresponding to the path.

3)分析弱相同路径的敏感性,筛选弱相同路径集合:3) Analyze the sensitivity of weakly identical paths, and screen the set of weakly identical paths:

依据电路应用背景,对电路路径进行安全属性划分,根据安全等级,确定电路的敏感路径,并集中选择与之匹配的弱相同路径集,形成弱相同敏感路径集R1={lk,tk},k=1,2,3...,集合中lk代表敏感路径,tk代表该路径对应的延时。According to the application background of the circuit, the security attributes of the circuit paths are divided, and the sensitive paths of the circuit are determined according to the security level, and the weakly identical path set that matches it is selected centrally to form the weakly identical sensitive path set R1={l k ,t k } , k =1, 2, 3..., lk represents a sensitive path in the set, and t k represents the delay corresponding to the path.

4)植入多环路片上延迟木马自检测结构,分析有效性:4) Implant the multi-loop on-chip delay Trojan self-detection structure to analyze the effectiveness:

在电路的空白区域,植入如图2所示的多环路片上延迟木马自检测结构,并通过模拟仿真对植入的自检测结构的有效性进行评估,确定电路能否有效地输出延迟信息。In the blank area of the circuit, implant the multi-loop on-chip delay Trojan self-detection structure as shown in Figure 2, and evaluate the effectiveness of the implanted self-detection structure through simulation to determine whether the circuit can effectively output delay information .

5)对芯片制造后路径的延迟信息进行测试:5) Test the delay information of the path after the chip is fabricated:

使用植入的多环路片上延迟木马自检测结构,测试所选择的弱相同路径集合上的延迟信息tk',并求出延迟信息的差值Δt'。Using the implanted multi-loop on-chip delay Trojan self-detection structure, the delay information t k ' on the selected weakly identical path set is tested, and the difference value Δt' of the delay information is obtained.

6)将延迟信息的差值进行对比,判断出疑似植入木马的路径:6) Compare the difference between the delay information and determine the path of the suspected Trojan horse implantation:

将芯片制造前通过网表得到的延迟信息的差值Δt与制造后通过片上自检测结构得到的弱相同路径延迟信息的差值Δt'进行对比,判断出疑似植入木马的路径。The difference Δt of the delay information obtained through the netlist before chip fabrication is compared with the difference Δt' of the weak identical path delay information obtained through the on-chip self-checking structure after fabrication, and the path suspected of implanting a Trojan is determined.

基于延时特征开展硬件木马检测研究,需要综合考虑延时信息的各类影响因素。电路路径上的延时由门电路的延时、互连线的延时以及非理想因素造成的延时组成。门电路内部由多个二极管、三极管以及mos管等组成,由于极间电容、分布电感以及传输时间等参数的影响最终导致传输延时。门与门之间互连线上的等效电容以及等效电阻会产生互连线延时。此外,在芯片的制造过程中,由于工艺复杂,难免会生成随机误差,这类工艺偏差会对集成电路芯片的延迟信息产生一定影响。因此,对于原始电路,一条路径上的延时主要由三部分组成:门电路延时tC、互连线延时tL、工艺偏差延时tF。路径总延时为:To carry out hardware Trojan detection research based on delay characteristics, it is necessary to comprehensively consider various influencing factors of delay information. The delay on the circuit path consists of the delay of the gate circuit, the delay of the interconnection, and the delay caused by the non-ideal factors. The gate circuit is composed of multiple diodes, triodes, and MOS tubes. Due to the influence of parameters such as inter-electrode capacitance, distributed inductance, and transmission time, the transmission delay is finally caused. The equivalent capacitance and equivalent resistance on the interconnect between the gates will cause the interconnect delay. In addition, in the manufacturing process of the chip, due to the complex process, random errors are inevitably generated, and such process deviations will have a certain impact on the delay information of the integrated circuit chip. Therefore, for the original circuit, the delay on a path is mainly composed of three parts: the gate circuit delay t C , the interconnection delay t L , and the process deviation delay t F . The total path delay is:

t=tC+tL+tF (1)t=t C +t L +t F (1)

硬件木马是指在芯片中被恶意植入的模块,该模块在特殊条件触法下,能够被攻击者利用而实现具有破坏性的功能。插入的硬件木马可能会导致信息泄露,改变电路功能,甚至破坏电路结构。当在一个电路中植入了硬件木马后,此硬件木马被视为一个冗余单元。由于木马电路中门延时以及互连线延时的影响,会使路径上的延时信息发生改变。被植入硬件木马后的路径的延时信息包括四部分:门电路延时tC、互连线延时tL、工艺偏差延时tF以及路径上的木马电路延时tT。路径总延时为:A hardware Trojan refers to a module maliciously implanted in a chip, which can be exploited by attackers to achieve destructive functions under special conditions. Inserted hardware Trojans may cause information leakage, change circuit function, or even destroy circuit structure. When a hardware Trojan is implanted in a circuit, the hardware Trojan is considered a redundant unit. Due to the influence of gate delay and interconnection delay in the Trojan horse circuit, the delay information on the path will change. The delay information of the path after the hardware Trojan is implanted includes four parts: the gate circuit delay t C , the interconnection delay t L , the process deviation delay t F and the Trojan circuit delay t T on the path. The total path delay is:

t=tC+tL+tF+tT (2)t=t C +t L +t F +t T (2)

弱相同路径是指延迟信息近似相同的一组路径。如图3所示,经过门电路g1、g2、g3、g7的路径为路径A,经过门电路g4、g5、g6、g7的路径为路径B,经过门电路g8、g9、g10、g11的路径为路径C。路径A、路径B以及路径C的延迟时间都由路径上门延迟、互连线延迟以及工艺偏差延时组成。路径A的总延迟时间:Weakly identical paths refer to a set of paths with approximately the same delay information. As shown in Figure 3, the path through gate circuits g1, g2, g3, and g7 is path A, the path through gate circuits g4, g5, g6, and g7 is path B, and the path through gate circuits g8, g9, g10, g11 for path C. The delay times of path A, path B, and path C are all composed of gate delay on the path, interconnect delay and process deviation delay. Total delay time for path A:

tA=tCA+tLA+tFA (3)tA = t CA + t LA + t FA (3)

其中,tCA为路径A上的门延时,tLA为路径A上的互连线延时,tFA为工艺偏差延时。Among them, t CA is the gate delay on path A, t LA is the interconnect line delay on path A, and t FA is the process deviation delay.

路径B的总延迟时间:Total delay time for path B:

tB=tCB+tLB+tFB (4)tB = t CB + t LB + t FB (4)

其中,tCB为路径B上的门延时,tLB为路径B上的互连线延时,tFB为工艺偏差延时。Among them, t CB is the gate delay on path B, t LB is the interconnect line delay on path B, and t FB is the process deviation delay.

路径C的总延迟时间:Total delay time for path C:

tC=tCC+tLC+tFC (5)tC = t CC + t LC + t FC (5)

其中,tCC为路径C上的门延时,tLC为路径C上的互连线延时,tFC为工艺偏差延时。Among them, t CC is the gate delay on path C, t LC is the interconnect line delay on path C, and t FC is the process deviation delay.

路径A的延时与路径B的延时的差值为:The difference between the delay of path A and the delay of path B is:

Δt=(tCA-tCB)+(tLA-tLB)+(tFA-tFB) (6)Δt=(t CA -t CB )+(t LA -t LB )+(t FA -t FB ) (6)

由于路径延时受工艺偏差影响较小,而且在同一电路中,工艺偏差的影响近似相同,(tFA-tFB)项可以忽略不计。因此,A、B、C三条路径延时信息的差值体现为门延时的差值以及互连线延时的差值,当A、B、C路径延时的差值在一定阈值范围内,则称路径A、路径B与路径C为弱相同路径。Since the path delay is less affected by process variation, and in the same circuit, the influence of process variation is approximately the same, the term (t FA -t FB ) can be ignored. Therefore, the difference between the delay information of the three paths A, B, and C is reflected as the difference between the gate delay and the interconnection delay. When the difference between the delays of the A, B, and C paths is within a certain threshold range , then path A, path B and path C are said to be weakly identical paths.

本发明之所以选择弱相同路径进行检测,是因为在未植入木马前,弱相同路径延时信息的差值在一定阈值范围内,在弱相同路径的其中一条路径上植入木马后,延时信息的差值会有较大的改变,使用弱相同路径更便于检测木马的植入。如图4所示,如果在路径C上植入木马结构,则路径C的延时变为:The reason why the present invention selects the weak identical path for detection is because before the Trojan horse is not implanted, the difference of the delay information of the weak identical path is within a certain threshold range. The difference of time information will change greatly, and it is more convenient to detect the implantation of Trojan horses by using weakly identical paths. As shown in Figure 4, if a Trojan horse structure is implanted on path C, the delay of path C becomes:

t=tCC+tLC+tFC+tTC (7)t = t CC + t LC + t FC + t TC (7)

其中,tCC为路径C上的门延时,tLC为路径C上的互连线延时,tFC为工艺偏差延时,tTC为路径C上木马结构的延时。Among them, t CC is the gate delay on path C, t LC is the interconnect line delay on path C, t FC is the process deviation delay, and t TC is the delay of the Trojan horse structure on path C.

路径C与路径A延时的差值变为:The difference between path C and path A delays becomes:

Δt'=(tCC-tCA)+(tLC-tLA)+tTC (8)Δt'=(t CC -t CA )+(t LC -t LA )+t TC (8)

其中,tCA为路径A上的门延时,tLA为路径A上的互连线延时。where t CA is the gate delay on path A, and t LA is the interconnect delay on path A.

未植入木马时路径C与路径A延时的差值为When the Trojan is not implanted, the difference between the delay of path C and path A is

Δt=(tCC-tCA)+(tLC-tLA) (9)Δt=(t CC -t CA )+(t LC -t LA ) (9)

由于Δt值较小,因此植入木马后Δt'的值相对于Δt的值将会有明显的改变。Since the value of Δt is small, the value of Δt' will be significantly changed relative to the value of Δt after the Trojan horse is implanted.

本发明所提出的多环路片上延迟木马自检测结构如图2所示,在多频信号生成模块,与非门n1、多路选择器MU1、非门n2、非门n3构成环路L1,与非门n4、多路选择器MU1、非门n2、非门n3、非门n5、非门n6构成环路L2,与非门n7、多路选择器MU1、非门n2、非门n3、非门n5、非门n6、非门n8、非门n9构成环路L3。通过EN1、EN2、EN3输入电平信号,通过多路选择器MU1选择导通的环路,由于三条环路上门延迟时间不同,因此选择不同的环路会在A点产生不同频率的信号,此信号为检测信号。The multi-loop on-chip delay Trojan self-detection structure proposed by the present invention is shown in Figure 2. In the multi-frequency signal generation module, a NAND gate n1, a multiplexer MU1, a NOT gate n2, and a NOT gate n3 form a loop L1, NAND gate n4, multiplexer MU1, NOT gate n2, NOT gate n3, NOT gate n5, NOT gate n6 form a loop L2, NAND gate n7, multiplexer MU1, NOT gate n2, NOT gate n3, The NOT gate n5, the NOT gate n6, the NOT gate n8, and the NOT gate n9 constitute the loop L3. Input level signals through EN1, EN2, EN3, and select the loop that is turned on through the multiplexer MU1. Since the door-to-door delay time of the three loops is different, selecting different loops will generate signals of different frequencies at point A. The signal is a detection signal.

弱相同路径模块中,显示了多条原始电路的弱相同路径,检测电路通过传输门TH1、TH2...THm、THn植入原始电路的相应位置。当原始电路正常工作时,传输门关闭;当处于测试状态时,传输门导通,检测信号在弱相同路径上传递。In the weak identical path module, multiple weak identical paths of the original circuit are displayed, and the detection circuit is implanted into the corresponding position of the original circuit through the transmission gates TH1, TH2...THm, THn. When the original circuit works normally, the transmission gate is closed; when it is in the test state, the transmission gate is turned on, and the detection signal is transmitted on the weak same path.

路径选择模块通过多路选择器MU2选择两条需要测试的弱相同路径,并将测试路径输出的测试信号传递给异或门。异或门将两条路径上的信号异或,由于方波信号在路径上传输的时间不同,因此,可以通过异或门输出的高电平信号的宽度,得到路径传输时间的差值。在图2中A、B、C、D点时序图如图5所示,其中A点信号为环形振荡器产生的测试信号,B点和C点信号为弱相同路径输出的测试信号,D点信号为经过异或的信号。D点的波形中Δt'即为弱相同路径延迟信息的差值。The path selection module selects two weak identical paths to be tested through the multiplexer MU2, and transmits the test signal output by the test path to the XOR gate. The XOR gate XORs the signals on the two paths. Since the transmission time of the square wave signal on the path is different, the difference of the path transmission time can be obtained by the width of the high-level signal output by the XOR gate. In Figure 2, the timing diagram of points A, B, C, and D is shown in Figure 5, where the signal at point A is the test signal generated by the ring oscillator, the signals at points B and C are the test signals output by the weak same path, and the signal at point D The signal is an XORed signal. In the waveform of point D, Δt' is the difference between the weak identical path delay information.

Claims (2)

1.一种基于弱相同路径的硬件木马检测方法,其特征是,步骤如下:1. a hardware Trojan detection method based on weak identical path, is characterized in that, step is as follows: 1)对集成电路版图进行静态时序分析,确定路径以及延迟信息:1) Perform static timing analysis on the layout of the integrated circuit to determine the path and delay information: 对电路版图进行静态时序分析,提取电路版图的网表并分析筛选出所有的路径信息,最后确定各路径的延迟信息t;Perform static timing analysis on the circuit layout, extract the netlist of the circuit layout, analyze and filter out all path information, and finally determine the delay information t of each path; 2)设定弱相同路径延迟阈值,分析并确定弱相同路径集合R:2) Set the weak identical path delay threshold, analyze and determine the weak identical path set R: 读取出网表中的路径以及延迟信息,依据已设定的路径延迟阈值,筛选出延迟信息的差值在一定范围内的若干条路径,将其确定为弱相同路径集合R={li,ti},i=1,2,3...,集合中li代表路径,ti代表该路径对应的延时;Read out the path and delay information in the netlist, and filter out several paths with the delay information difference within a certain range according to the set path delay threshold, and determine them as the weakly identical path set R={li i , t i }, i=1, 2, 3..., li in the set represents the path, and t i represents the delay corresponding to the path; 3)分析弱相同路径的敏感性,筛选弱相同路径集合:3) Analyze the sensitivity of weakly identical paths, and screen the set of weakly identical paths: 依据电路应用背景,对电路路径进行安全属性划分,根据安全等级,确定电路的敏感路径,并集中选择与之匹配的弱相同路径集,形成弱相同敏感路径集R1={lk,tk},k=1,2,3...,集合中lk代表敏感路径,tk代表该路径对应的延时;According to the application background of the circuit, the security attributes of the circuit paths are divided, and the sensitive paths of the circuit are determined according to the security level, and the weakly identical path set that matches it is selected centrally to form the weakly identical sensitive path set R1={l k ,t k } , k =1, 2, 3..., lk represents the sensitive path in the set, and t k represents the delay corresponding to the path; 4)植入多环路片上延迟木马自检测结构,分析有效性:4) Implant the multi-loop on-chip delay Trojan self-detection structure to analyze the effectiveness: 在电路的空白区域,植入多环路片上延迟木马自检测结构,并通过模拟仿真对植入的自检测结构的有效性进行评估,确定电路能否有效地输出延迟信息;In the blank area of the circuit, implant a multi-loop on-chip delay Trojan self-detection structure, and evaluate the effectiveness of the implanted self-detection structure through simulation to determine whether the circuit can effectively output delay information; 5)对芯片制造后路径的延迟信息进行测试:5) Test the delay information of the path after the chip is fabricated: 使用植入的多环路片上延迟木马自检测结构,测试所选择的弱相同路径集合上的延迟信息tk',并求出延迟信息的差值Δt';Use the implanted multi-loop on-chip delay Trojan self-detection structure to test the delay information t k ' on the selected weakly identical path set, and obtain the difference Δt' of the delay information; 6)将延迟信息的差值进行对比,判断出疑似植入木马的路径:6) Compare the difference between the delay information and determine the path of the suspected Trojan horse implantation: 将芯片制造前通过网表得到的延迟信息的差值Δt与制造后通过片上自检测结构得到的弱相同路径延迟信息的差值Δt'进行对比,判断出疑似植入木马的路径。The difference Δt of the delay information obtained through the netlist before chip fabrication is compared with the difference Δt' of the weak identical path delay information obtained through the on-chip self-checking structure after fabrication, and the path suspected of implanting a Trojan is determined. 2.一种多环路片上延迟木马自检测结构,其特征是,包括:多频信号生成模块,与非门n1、多路选择器MU1、非门n2、非门n3构成环路L1,与非门n4、多路选择器MU1、非门n2、非门n3、非门n5、非门n6构成环路L2,与非门n7、多路选择器MU1、非门n2、非门n3、非门n5、非门n6、非门n8、非门n9构成环路L3;通过与非门n1、n4、n7的输入端EN1、EN2、EN3输入电平信号,通过多路选择器MU1选择导通的环路,由于三条环路上门延迟时间不同,因此选择不同的环路会在多路选择器MU1输出端A点产生不同频率的信号,此信号为检测信号;2. A multi-loop on-chip delay Trojan self-detection structure is characterized in that, comprising: a multi-frequency signal generation module, a NAND gate n1, a multiplexer MU1, a NOT gate n2, and a NOT gate n3 to form a loop L1, and NOT gate n4, multiplexer MU1, NOT gate n2, NOT gate n3, NOT gate n5, NOT gate n6 form a loop L2, NAND gate n7, multiplexer MU1, NOT gate n2, NOT gate n3, NOT gate Gate n5, NOT gate n6, NOT gate n8, NOT gate n9 form a loop L3; input level signals through the input terminals EN1, EN2, EN3 of NAND gates n1, n4, n7, and select conduction through the multiplexer MU1 Because the door-to-door delay time of the three loops is different, selecting different loops will generate signals of different frequencies at point A of the output terminal A of the multiplexer MU1, and this signal is the detection signal; 对于多条待测电路构成的弱相同路径,检测信号通过传输门TH1、TH2...THm、THn植入待测电路的相应位置,当待测电路正常工作时,传输门关闭;当处于测试状态时,传输门导通,检测信号在弱相同路径上传递;For the weak identical paths formed by multiple circuits to be tested, the detection signal is implanted into the corresponding position of the circuit to be tested through the transmission gates TH1, TH2...THm, THn. When the circuit to be tested is working normally, the transmission gate is closed; In the state, the transmission gate is turned on, and the detection signal is transmitted on the weak same path; 路径选择模块通过多路选择器MU2选择两条需要测试的弱相同路径,并将测试路径输出的测试信号传递给异或门,异或门将两条路径上的信号异或,通过异或门输出的高电平信号的宽度,得到路径传输时间的差值。The path selection module selects two weak identical paths that need to be tested through the multiplexer MU2, and transmits the test signal output by the test path to the XOR gate. The XOR gate XORs the signals on the two paths and outputs it through the XOR gate. The width of the high-level signal is obtained, and the difference of the path transmission time is obtained.
CN201910798534.6A 2019-08-27 2019-08-27 Hardware Trojan detection device and method based on weak same path Active CN110598399B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910798534.6A CN110598399B (en) 2019-08-27 2019-08-27 Hardware Trojan detection device and method based on weak same path

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910798534.6A CN110598399B (en) 2019-08-27 2019-08-27 Hardware Trojan detection device and method based on weak same path

Publications (2)

Publication Number Publication Date
CN110598399A true CN110598399A (en) 2019-12-20
CN110598399B CN110598399B (en) 2023-08-22

Family

ID=68855900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910798534.6A Active CN110598399B (en) 2019-08-27 2019-08-27 Hardware Trojan detection device and method based on weak same path

Country Status (1)

Country Link
CN (1) CN110598399B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111208416A (en) * 2020-01-15 2020-05-29 西安电子科技大学 Integrated circuit process credibility detection method and circuit based on time-to-digital converter
CN111208415A (en) * 2020-01-15 2020-05-29 西安电子科技大学 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit
CN113688434A (en) * 2020-05-19 2021-11-23 天津大学 A hardware Trojan detection method based on process deviation type TDC
TWI813401B (en) * 2022-07-27 2023-08-21 瑞昱半導體股份有限公司 Static timing analysis method and static timing analysis system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN109684881A (en) * 2017-10-19 2019-04-26 中国科学院微电子研究所 A kind of bypass detection method and device
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan Detection Method Based on Path Delay Fingerprint

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684881A (en) * 2017-10-19 2019-04-26 中国科学院微电子研究所 A kind of bypass detection method and device
CN109657464A (en) * 2018-10-29 2019-04-19 西安电子科技大学 A kind of hardware Trojan horse detection method based on path delay analysis
CN109711204A (en) * 2018-10-29 2019-05-03 西安电子科技大学 Hardware Trojan Detection Method Based on Path Delay Fingerprint

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SAMER MOEIN: "Hardware Attack Mitigation Techniques Analysis", 《RESEARCHGATE》 *
SANDIP RAY: "System-on-Chip Platform Security Assurance:Architecture and Validation", 《IEEE》 *
ZIXUAN ZHANG: "Side Channel Analysis of Hardware Trojan Based on Smooth Filtering Algorithm", 《IEEE》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111208416A (en) * 2020-01-15 2020-05-29 西安电子科技大学 Integrated circuit process credibility detection method and circuit based on time-to-digital converter
CN111208415A (en) * 2020-01-15 2020-05-29 西安电子科技大学 Distributed Ring Oscillator Network Layout Filling Hardware Trojan Detection Method and Circuit
CN111208416B (en) * 2020-01-15 2021-08-20 西安电子科技大学 Integrated circuit process reliability detection method and circuit based on time-to-digital converter
CN113688434A (en) * 2020-05-19 2021-11-23 天津大学 A hardware Trojan detection method based on process deviation type TDC
CN113688434B (en) * 2020-05-19 2023-10-27 天津大学 Hardware Trojan detection method based on process deviation type TDC
TWI813401B (en) * 2022-07-27 2023-08-21 瑞昱半導體股份有限公司 Static timing analysis method and static timing analysis system

Also Published As

Publication number Publication date
CN110598399B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN110598399B (en) Hardware Trojan detection device and method based on weak same path
CN106291324B (en) A kind of on piece differential delay measuring system and recycling integrated circuit recognition methods
EP3246717B1 (en) On-chip monitor circuit and semiconductor chip
CN103884980B (en) Hardware Trojan horse detection method and system based on supply current
CN106778263A (en) Effectively improve the method that hardware Trojan horse activates probability
Wang et al. BIST methodology, architecture and circuits for pre-bond TSV testing in 3D stacking IC systems
Wang et al. Silicon odometers: Compact in situ aging sensors for robust system design
Zarrinchian et al. Latch-based structure: A high resolution and self-reference technique for hardware trojan detection
US6944808B2 (en) Method of evaluating core based system-on-a-chip
Sung et al. A delay test architecture for TSV with resistive open defects in 3-D stacked memories
CN102262212A (en) System for detecting trigger single particle effect in digital application specific integrated circuit
CN113391193B (en) Circuit burn-in test method based on BIST structure and self-oscillating ring
CN108107343B (en) An Aging Sensor Based on Real SH Time
CN105372577A (en) On-chip variation detection method and integrated circuit
He et al. A side-channel hardware trojan detection method based on fuzzy c-means clustering and fusion distance algorithms
US6553545B1 (en) Process parameter extraction
Nedovic et al. A test circuit for measurement of clocked storage element characteristics
Huang et al. PLL-assisted timing circuit for accurate TSV leakage binning
Jia et al. A DLL design for testing I/O setup and hold times
Li et al. Negative-skewed shadow registers for at-speed delay variation characterization
CN106249034B (en) A kind of on piece voltage drop alarm for cooperateing with dynamic voltage frequency adjustment system
CN113688434B (en) Hardware Trojan detection method based on process deviation type TDC
Pei et al. On-chip ring oscillator based scheme for TSV delay measurement
Lecomte et al. On-chip fingerprinting of IC topology for integrity verification
Tianming et al. An enhanced time-to-digital conversion solution for pre-bond TSV dual faults testing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant