Research on Detection Method and Protection Measure of Hardware Trojan
With the high speed development of the integrated circuit technique,chip design and manu-facture are increasingly vulnerable to malicious acts.As a discipline originated from the cryptography,hardware security plays a crucial role in microelectronic systems and involves the hardware design and the secure multi-party computation.Hardware Trojan(HT)is a major threat to hardware security since HT will change the circuit behavior and reveal information once activated.In this paper,existing detec-tion methods and protection measures of HT are comprehensively summarized.First,basic concept,HT type and threat to system security are introduced.Then,pre-tape-out and post-tape-out HT detection methods are reviewed in detail,including formal verification,functional verification,side channel anal-ysis and logic testing,etc.Merits,demerits and applicable scenarios of each method are also presen-ted.In addition,protection measures in designing,manufacturing and supplying processes are dis-cussed,e.g.strategy of third-party intellectual property trusted design,digital signature and encryption technique,etc.Finally,current research status of HT detection and protection technique are summa-rized,Existing challenge and future development direction are presented.This paper could provide a comprehensive reference for HT research to improve the security of the digital infrastructure.