Hardware Trojan horse detection method based on lifting algorithm

The invention discloses a hardware Trojan horse detection method based on a lifting algorithm. Processing according to the topological structure of the integrated circuit to obtain a first controllability value, a second controllability value and an observability value of each node of the integrated...

Full description

Saved in:
Bibliographic Details
Main Authors LI ERPING, WU CHENGHAN
Format Patent
LanguageChinese
English
Published 27.03.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention discloses a hardware Trojan horse detection method based on a lifting algorithm. Processing according to the topological structure of the integrated circuit to obtain a first controllability value, a second controllability value and an observability value of each node of the integrated circuit; performing density-based clustering according to the first controllability value, the second controllability value and the observability value of each node of the integrated circuit to obtain a matrix of band class distances; and training classification is performed by adopting a weak classifier, the weak classifier is combined to obtain a final classifier, and then the final classifier is adopted to process the matrix X'with the class distance obtained by processing the to-be-detectedintegrated circuit so as to obtain the hardware Trojan horse detection result of the to-be-detected integrated circuit. The method provided by the invention has higher accuracy than a bypass analysismeans under a large sampl
Bibliography:Application Number: CN201911142702