http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-112685800-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1e74277852f1aae0a3ff13f59a65456d
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-76
filingDate 2019-10-17^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_798c9a314ed1ecc51e5e3106e4a17a61
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_81f04802b5f15b72854c832ea1d4994c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_f8a4d5b1f2feb378e31593dea7a21281
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e23aca00c56701a6c1b5f6f30f037a78
publicationDate 2021-04-20^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CN-112685800-A
titleOfInvention Hardware Trojan horse detection method based on time window self-comparison
abstract The invention discloses a hardware Trojan horse detection method based on time window self-comparison, which mainly comprises three parts: and (3) performing superposition self-comparison on current data in the time window region of the circuit to be detected, performing data post-processing on the selected current result, and realizing a gold-free model detection method. The detection method based on time window self-comparison utilizes the characteristics that process angles of different chips are different and the process angle of the same chip is the same, and can effectively overcome the influence of process fluctuation by selecting the current values of different time window intervals of the transient current of the same chip in the same circuit state and carrying out comparative analysis. In addition, the invention also utilizes the advantage of the Mahalanobis distance to carry out data post-processing on the time window current result through the Mahalanobis distance, increases the distinguishing degree of the influence of the hardware Trojan on the circuit bypass parameters, and further improves the Trojan detection sensitivity. Finally, the method can realize Trojan horse detection under the condition that no golden model reference circuit is used as reference, solve the problem that the golden model reference circuit is excessively dependent in the Trojan horse detection process, and improve the Trojan horse detection efficiency.
priorityDate 2019-10-17^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID5272749
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID426065025

Showing number of triples: 1 to 15 of 15.