首页>
外国专利>
Graph-Based Approach Towards Hardware Trojan Vulnerability Analysis
Graph-Based Approach Towards Hardware Trojan Vulnerability Analysis
展开▼
机译:基于图形的硬件Trojan漏洞分析方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present disclosure describes various embodiments of hardware trojan triggering (HTT) signal analysis. As such, an exemplary method comprises capturing switching activity of nodes for a design of an integrated circuit during a simulation of an application of a test pattern to the design; identifying one or more nodes in a graphical representation of the design that do not toggle within an individual window of time across multiple windows of time; determining unique paths that can be formed by the identified nodes within each of the multiple windows of time; determining one or more unique paths that occur across consecutive windows of time; appending the one or more unique paths that occur across consecutive windows of time in a set; and outputting the one or more unique paths in the set as rare trojan horse triggering paths for the design. Other systems and methods are also presented.
展开▼