Hardware Trojan horse detection method based on lifting algorithm
The invention discloses a hardware Trojan horse detection method based on a lifting algorithm. Processing according to the topological structure of the integrated circuit to obtain a first controllability value, a second controllability value and an observability value of each node of the integrated...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
27.03.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention discloses a hardware Trojan horse detection method based on a lifting algorithm. Processing according to the topological structure of the integrated circuit to obtain a first controllability value, a second controllability value and an observability value of each node of the integrated circuit; performing density-based clustering according to the first controllability value, the second controllability value and the observability value of each node of the integrated circuit to obtain a matrix of band class distances; and training classification is performed by adopting a weak classifier, the weak classifier is combined to obtain a final classifier, and then the final classifier is adopted to process the matrix X'with the class distance obtained by processing the to-be-detectedintegrated circuit so as to obtain the hardware Trojan horse detection result of the to-be-detected integrated circuit. The method provided by the invention has higher accuracy than a bypass analysismeans under a large sampl |
---|---|
Bibliography: | Application Number: CN201911142702 |