期刊文献+

GDSII图片生成与校正 预览

Revision of deviation between the pictures generated from GDSII data and the photos of die
在线阅读 下载PDF
分享 导出
摘要 随着芯片设计、生产环节的增多,芯片中存在硬件木马的可能性越来越高,对于安全性要求较高的芯片就需要对其进行硬件木马检测.反向解剖芯片并将其与原始GDSII文件进行一致性比对是检测芯片是否被植入硬件木马的主要方法之一.而从GDSII文件生成与反向解剖芯片的照片一一对应的图片(后面统称为GDSII图片)是木马分析的重要步骤,为此提出了两点定位算法对GDSII图片进行分割;同时,针对芯片照相和拼接过程中存在图片信息位置偏移的问题,提出了一种基于偏差统计的校正算法.经过工程实际应用证明,该算法较好地校正了GDSII图片与芯片照片的偏差,消除了因为图片信息位置偏移所带来的影响. As the steps for the design and manufacture of the die increase,it is more and more possible to have hardware Trojans implanted in the chip.So it is necessary to detect the hardware Trojans for the die,especially with high security requirements.Reversely anatomizing the die and comparing it with the original GDSII file on the consistency is one of the main methods to test whether the die has been implanted hardware Trojans or not.It is an important step to generate the pictures from the GDSII file and make the pictures correspond to the photos which are got by reversely anatomizing the die.Therefore, we propose a two-point position algorithm for the segmentation of GDSII pictures.Meanwhile,for the position offset of the picture information generated in the process of taking photos of die and splicing, we propose a correction algorithm based on deviation statistics.Engineer practical application proves that the algorithm revises the deviation between the pictures generated from GDSII file and the photos of the die well.And it eliminates the impact from the position offset of the picture information.
作者 胡星 邝继顺 李少青 HU Xing;KUANG Ji-shun;LI Shao-qing;College of Information Science and Engineering,Hunan University;College of Computer,National University of Defense Technology;
出处 《计算机工程与科学》 CSCD 北大核心 2014年第2期222-225,共4页 Computer Engineering & Science
基金 超级计算机处理器研发(2013ZX01028001-002) 核高基重大专项资助项目(2012ZX01027004-003)
关键词 GDSII 图片 生成 校正 GDSII pictures generation revise
  • 相关文献

参考文献5

  • 1ADEE S.The hunt for the kill swich[J].IEEE Spectrum,2008,45(5):34-39. 被引量:1
  • 2Chip security-hardware trojan detection technology[EB/OL][2013-04-25].http://www.ceprei.com/ceprei_ system/News_View.asp- NewsID=511. 被引量:1
  • 3Wang Wei,Zhang Min,Zhu Qing-shan,et al.An IP-tort identify method based on chip anti-project photos[C]// Proc of the 16th Annual Conference on Computer Engineering and Technology and Microprocessor Technology Forum,2012:353-358. 被引量:1
  • 4芯片安全性-硬件木马检测技术[EB/OL][2013-04-25].http://www.ceprei.com/ceprei_system/News_View.asp-NewsID=511. 被引量:1
  • 5王伟,张民,朱青山,等.-种基于芯片解剖照片的IP核侵权鉴定方法[C]∥第十六届计算机工程与工艺年会暨第二届微处理器技术论坛论文集,2012:353-358. 被引量:1
投稿分析

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈