Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm

被引:0
|
作者
Yingjian Yan [1 ]
Xin Chuan [1 ]
机构
[1] Department of Microelectronics,Institute of Information Science and Technology,Zhengzhou
关键词
hardware Trojan; logic detection; combinatorial correlation coefficient; test vectors;
D O I
10.15918/j.jbit1004-0579.201827.0210
中图分类号
TN407 [测试和检验];
学科分类号
摘要
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
引用
收藏
页码:230 / 236
页数:7
相关论文
共 50 条
  • [21] Hardware Trojan detection method based on combined features analysis
    Zhao Y.
    Li B.
    Ma H.
    He J.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6
  • [22] A Threshold based Hardware Trojan Detection Technique Using XGBoost Algorithm
    Das, Ranit
    Dhar, Tapobrata
    Roy, Surajit Kumar
    2022 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2022,
  • [23] A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    Salmani, Hassan
    Tehranipoor, Mohammad
    Plusquellic, Jim
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (01) : 112 - 125
  • [24] An Iterative Greedy Algorithm for Hardware/Software Partitioning
    Lin, Geng
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 777 - 781
  • [25] An Efficient ML -based Hardware Trojan Localization Framework for RTL Security Analysis
    Fan, Ruchao
    Tang, Yongming
    Sun, Hao
    Liu, Jiyuan
    Li, He
    2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
  • [26] Hardware Trojan Detection Method Based on Time Feature of Chip Temperature
    Yang, Lian
    Li, Xiong
    Li, Huan
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 1029 - 1032
  • [27] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [28] Hardware Trojan Detection Method Based on Enhanced Local Outlier Factor
    Nie, Tingyuan
    Nie, Jingjing
    Zhao, Kun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (02)
  • [29] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    Nourian, M. A.
    Fazeli, M.
    Hely, D.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (04): : 461 - 470
  • [30] A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
    Wang Xiaohan
    Wang Tao
    Li Xiongwei
    Zhang Yang
    Huang Changyang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (12) : 3043 - 3050