| With the rapid development of the integrated circuit industry,the design and manufacture of integrated circuits gradually tend to be separated.The linkage between the design company and the foundries is particularly important.However,due to the existence of untrustworthy foundries,the reliability and safety of the final product may be seriously compromised.The malicious circuit represented by the hardware Trojan horse can attack the original circuit at every stage of production and manufacturing,resulting in the disclosure of confidential information,modification of circuit function,circuit damage and other serious consequences.How to realize the effective detection of hardware trojans or the reliable design to prevent the insertion of hardware trojans has become a hot topic in the integrated circuit industry.The existing research shows that the critical path of the circuit is more vulnerable to the attack of hardware trojans.Especially when the hardware Trojan horse has the characteristics of not changing the circuit main output and occupying less circuit resources,the influence of the Trojan horse on the circuit is easy to be confused by the process fluctuation or the external environment noise,and the current mainstream hardware Trojan horse detection methods are difficult to realize effective detection.This paper proposes a on-line monitoring scheme to prevent the insertion of hardware Trojan horse.Firstly,the delay of each path in the circuit is calculated according to the logic structure of the circuit topology,and the path with the maximum delay is selected as the critical path of the circuit.The transition probabilities of all nodes in the path and their associated nodes are then calculated.Finally,according to the configuration of circuit resources,the monitor is designed based on the nodes in the critical path which are lower than the set threshold.Compared with the detection method based on logic test,the design of this paper can effectively solve the problem of not changing the main output of the circuit when the hardware Trojan horse is activated.Compared with the detection method based on side channel analysis,the design in this paper can effectively solve the problem that the influence of the implanted hardware Trojan horse is covered by the environmental noise or process fluctuation.The experimental results show that the scheme can effectively prevent and monitor the implantation of hardware trojans in the critical path of ISCAS85 circuitunder the condition of increasing the area cost by 24.32%.Under the background that VLSI is widely used in IC industry,the detection of hardware trojans often brings high detection cost,and the controllability and observability of internal circuit signals will affect the difficulty of detection.This paper presents a hardware Trojan horse detection scheme based on regional evaluation.Through the circuit vulnerability analysis and testability analysis,and based on the configurable layout and wiring resources,critical path and low conversion probability node distribution in each region,the quantitative regional risk assessment is carried out in each circuit region to reflect the implantation risk of hardware Trojan horse in each circuit region.In the process of hardware Trojan horse detection,the key screening of high-risk areas can be carried out according to the regional risk assessment results,thus greatly reducing the detection cost of hardware Trojan horse.At the same time,the risk assessment process proposed by the scheme can be compared horizontally between circuits,which has certain reference value for circuit optimization and reliable design. |