Abstract: A hardware trojan security system may perform a computer implemented method to secure an electronic facility in relation to a hardware trojan, by performing a trojan vulnerability analysis, locating an instrument site location, identifying a selected instrument in relation to an effect of the trojan, marking instrument control-side markers and instrument operative-side markers, marking facility model control-side markers and facility model operative-side markers, marking access architecture control-side markers, and connecting the instrument with the facility model and access architecture by matching corresponding markers.
Type:
Grant
Filed:
December 2, 2021
Date of Patent:
January 28, 2025
Assignee:
Amida Technology Solutions, Inc.
Inventors:
Alfred Larry Crouch, Peter Lawrence Levin, John David Akin, Adam Wade Ley, Matthew McKinnon Ritonia, Wesley Layton Ellington, Maria Anne Spasojevic
Abstract: A method and system for analysis of a facility may include providing an emulation host system, first generating a golden circuit model on the emulation host system, first inserting a first hardware trojan model, first emulating operation of the golden circuit model, and second emulating operation of the first hardware trojan model. A facility may include a trojan instrument facility having a trojan detection instrument comparing logic circuit output against a threshold for detecting hardware trojan activity, and outputting alert data, and in relation to opening one of a plurality of scannable access points, a scannable register is inserted into an active scan chain with an associated instrument interface.
Abstract: A method and system for analysis of a facility may include providing an emulation host system, first generating a golden circuit model on the emulation host system, first inserting a first hardware trojan model, first emulating operation of the golden circuit model, and second emulating operation of the first hardware trojan model. A facility may include a trojan instrument facility having a trojan detection instrument comparing logic circuit output against a threshold for detecting hardware trojan activity, and outputting alert data, and in relation to opening one of a plurality of scannable access points, a scannable register is inserted into an active scan chain with an associated instrument interface.
Abstract: A method and system for analysis of a facility may include providing an emulation host system, first generating a golden circuit model on the emulation host system, first inserting a first hardware trojan model, first emulating operation of the golden circuit model, and second emulating operation of the first hardware trojan model. A facility may include a trojan instrument facility having a trojan detection instrument comparing logic circuit output against a threshold for detecting hardware trojan activity, and outputting alert data, and in relation to opening one of a plurality of scannable access points, a scannable register is inserted into an active scan chain with an associated instrument interface.
Type:
Grant
Filed:
September 28, 2018
Date of Patent:
June 20, 2023
Assignee:
Amida Technology Solutions, Inc.
Inventors:
Alfred L. Crouch, Eve Naomi Hunter, Peter Lawrence Levin
Abstract: A hardware trojan security system may perform a computer implemented method to secure an electronic facility in relation to a hardware trojan, by performing a trojan vulnerability analysis, locating an instrument site location, identifying a selected instrument in relation to an effect of the trojan, marking instrument control-side markers and instrument operative-side markers, marking facility model control-side markers and facility model operative-side markers, marking access architecture control-side markers, and connecting the instrument with the facility model and access architecture by matching corresponding markers.
Type:
Application
Filed:
December 2, 2021
Publication date:
May 26, 2022
Applicant:
Amida Technology Solutions, Inc.
Inventors:
Alfred Larry Crouch, Peter Lawrence Levin, John David Akin, Adam Wade Ley, Matthew McKinnon Ritonia, Wesley Layton Ellington, Maria Anne Spasojevic
Abstract: A method and system for analysis of a facility may include providing an emulation host system, first generating a golden circuit model on the emulation host system, first inserting a first hardware trojan model, first emulating operation of the golden circuit model, and second emulating operation of the first hardware trojan model. The method includes the application of operative vectors to a golden model in simulation or emulation with support of embedded activity monitors to identify which modules contribute to a given functional operation as a method to identify where trojan attacks can be placed.
Abstract: A method and system for analysis of an electronic facility may include providing a mathematical analysis using a scoring system to make generalization about a design and select locations for placement of trojans, triggers and trojan detection instruments within an electronic facility. Such mathematical analysis may include Controllability-Observability analysis as applied to trojan insertion and attacks, and trojan detection instruments.