计算机科学
特洛伊木马
炸薯条
硬件特洛伊木马
逆向工程
移位寄存器
鉴定(生物学)
扫描链
计算机硬件
电子线路
方案(数学)
集成电路
嵌入式系统
电气工程
工程类
计算机安全
数学
操作系统
植物
生物
电信
数学分析
作者
Qidong Wang,Aijiao Cui,Gang Qu
标识
DOI:10.1109/itc-asia53059.2021.9808653
摘要
Counters have been widely adopted in modern circuit design. Also, they have been used to facilitate the implementation of hardware Trojan. It is necessary to reverse engineer the counter design from a chip so as to detect the possible Trojan. However, the existing reverse engineering technique is expensive and intrusive. In this work, we first propose to rely on the scan dump data to identify the registers included in a counter. In this scheme, the scan data can be collected by operating the chip in testing mode, thus the proposed scheme never impacts or impairs a chip as the traditional reverse engineering techniques. The regularity of data from different types of counters is first analyzed. The relationship between the data from a pair of registers is explored so that the counter registers can be distinguished from other normal registers. The proposed method is applied on several circuits containing counters from OpenCores. The experiment results show the proposed method can accurately identify the counter registers with a perfect true positive rate and true negative rate.
科研通智能强力驱动
Strongly Powered by AbleSci AI