Graph Features Analysis and Detection Method of IP Soft Core Hardware Trojan
With the rapid development of integrated circuit technology,chips are easily implanted with malicious hardware Trojan logic in the process of design,production and packaging.Current security detection methods for IP soft core are logically complex,prone to errors and omissions,and unable to detect encrypted IP soft core.The paper uses the feature differences of non-controllable IP soft core and hardware Trojan Register Transfer Level(RTL)code grayscale map,proposing a hardware Trojan detection method for IP soft cores based on graph feature analysis,through the map conversion and map enhancement to get the standard map,using the texture feature extraction matching algorithm to achieve hardware Trojan detection.The experimental subjects are functional logic units with seven types of typical Trojans implanted during the design phase,and the detection results show that the detection correct rate of seven types of typical hardware Trojans has reached more than 90%,and the average growth rate of the number of successful feature point matches after the image enhancement has reached 13.24%,effectively improving the effectiveness of hardware Trojan detection.
IP soft coreHardware TrojanGrayscale mapTexture featureDetection algorithm