Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm

被引:0
|
作者
Yingjian Yan [1 ]
Xin Chuan [1 ]
机构
[1] Department of Microelectronics,Institute of Information Science and Technology,Zhengzhou
关键词
hardware Trojan; logic detection; combinatorial correlation coefficient; test vectors;
D O I
10.15918/j.jbit1004-0579.201827.0210
中图分类号
TN407 [测试和检验];
学科分类号
摘要
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
引用
收藏
页码:230 / 236
页数:7
相关论文
共 50 条
  • [31] A Detection Method of Hardware Trojan Based on Two-Dimension Calibration
    Sui, Qiang
    Wu, Zhikai
    Li, Jun
    Li, Shaoqing
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2795 - 2799
  • [32] HTrans: Transformer-based Method for Hardware Trojan Detection and Localization
    Li, Yilin
    Li, Shan
    Shen, Haihua
    2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 31 - 36
  • [33] A Deep Learning Method Based on the Attention Mechanism for Hardware Trojan Detection
    Tang, Wenjing
    Su, Jing
    He, Jiaji
    Gao, Yuchan
    ELECTRONICS, 2022, 11 (15)
  • [34] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [35] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    M. A. Nourian
    M. Fazeli
    D. Hely
    Journal of Electronic Testing, 2018, 34 : 461 - 470
  • [36] An Efficient Approach for Hardware Trojan Detection Based on Side-Channel Analysis
    Tiwari, Shubham Kumar
    Ramesh, S.R.
    2023 IEEE 20th India Council International Conference, INDICON 2023, 2023, : 85 - 90
  • [37] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [38] An Efficient Greedy Minimum Spanning Tree Algorithm Based on Vertex Associative Cycle Detection Method
    Biswas, Prantik
    Goel, Mansi
    Negi, Harshita
    Datta, Megha
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 513 - 519
  • [39] Area Reduction AES Algorithm in Hardware Trojan Detection
    MacTino, S.
    Priya, S. Sridevi Sathya
    Naveenkumar, R.
    Napoleon, A.
    Proceedings of the 3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023, 2023, : 1035 - 1040
  • [40] A New Testing Method for Hardware Trojan Detection
    Nejadmoghadam, Fahimeh
    Mahani, Ali
    Kavian, Yousef S.
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719