首页> 外国专利> Graph-Based Approach Towards Hardware Trojan Vulnerability Analysis

Graph-Based Approach Towards Hardware Trojan Vulnerability Analysis

机译:基于图形的硬件Trojan漏洞分析方法

摘要

The present disclosure describes various embodiments of hardware trojan triggering (HTT) signal analysis. As such, an exemplary method comprises capturing switching activity of nodes for a design of an integrated circuit during a simulation of an application of a test pattern to the design; identifying one or more nodes in a graphical representation of the design that do not toggle within an individual window of time across multiple windows of time; determining unique paths that can be formed by the identified nodes within each of the multiple windows of time; determining one or more unique paths that occur across consecutive windows of time; appending the one or more unique paths that occur across consecutive windows of time in a set; and outputting the one or more unique paths in the set as rare trojan horse triggering paths for the design. Other systems and methods are also presented.
机译:本公开描述了硬件特洛伊木马触发(HTT)信号分析的各种实施例。 这样,示例性方法包括在模拟测试模式的应用期间捕获节点的切换活动,以进行集成电路的应用; 在设计的图形表示中识别一个或多个节点,该节点不会在多个窗口跨多个窗口的单个时间窗口内切换; 确定可以由多个窗口中的每个窗口内所识别的节点形成的唯一路径; 确定连续窗口的一个或多个唯一路径; 附加一个或多个唯一路径,在一组中连续的时间窗口发生; 并在集合中输出一个或多个唯一路径作为罕见的特洛伊木马触发设计的路径。 还提出了其他系统和方法。

著录项

  • 公开/公告号US2021286881A1

    专利类型

  • 公开/公告日2021-09-16

    原文格式PDF

  • 申请/专利权人 UNIVERSITY OF SOUTH FLORIDA;

    申请/专利号US202117191038

  • 发明设计人 SHEIKH ARIFUL ISLAM;

    申请日2021-03-03

  • 分类号G06F21/57;

  • 国家 US

  • 入库时间 2022-08-24 21:05:04

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号