Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection

被引:2
|
作者
Rathor, Vijaypal Singh [1 ]
Singh, Deepak [2 ]
Singh, Simranjit [3 ]
Sajwan, Mohit [3 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Jabalpur, India
[2] Natl Inst Technol, Dept CSE, Raipur, India
[3] Bennett Univ, Dept Comp Sci Engn, Greater Noida, India
关键词
Hardware Trojan; Rare-triggered nets; Test pattern generation; Multi-objective optimization; Genetic Algorithm; Hardware testing; GENETIC ALGORITHM; ATTACKS; SECURITY;
D O I
10.1007/s10836-023-06071-w
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware Trojan (HT) is a severe security threat during the development of an integrated circuit that can deviate the IC from its normal function and/or leak sensitive information during in-field operations. Trojans are often inserted during the fabrication phase, and to have Trojan-free ICs; it is highly desirable to detect them during post-silicon testing. Different test pattern generation-based HT detection techniques are reported in the literature to detect the Trojan during post-silicon testing. The existing methods provide low coverage and require a large number of test patterns. This paper proposes a new test pattern generation-based HT detection technique that provides high coverage while requiring less number of patterns. The proposed technique generates the optimal number of test patterns that activate the rare events by framing the problem as multi-objective optimization and solving it through a non-dominated sorting genetic algorithm (NSGA-II). The Trojans are mostly inserted using rare-triggered nodes (highly vulnerable, low controllable, and low observable). Thus, our technique applies the generated patterns during post-silicon testing to activate Trojans. Further, we also present the use of checker (detection) logic along with a proposed approach to effectively detect the Trojan during testing. The experimental evaluation on ISCAS benchmarks shows that the proposed technique provides 12 times higher trigger coverage with 1/3 fewer test patterns than the best-known existing genetic algorithm-based technique.
引用
收藏
页码:371 / 385
页数:15
相关论文
共 50 条
  • [21] Scalable multi-objective optimization test problems
    Deb, K
    Thiele, L
    Laumanns, M
    Zitzler, E
    CEC'02: PROCEEDINGS OF THE 2002 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2002, : 825 - 830
  • [22] Eyelid Detection Method Based on a Fuzzy Multi-Objective Optimization
    Alvarez-Betancourt, Yuniol
    Garcia-Silvente, Miguel
    COMPUTACION Y SISTEMAS, 2014, 18 (01): : 65 - 78
  • [23] Construction of test problems for multi-objective optimization
    Deb, K
    GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 1999, : 164 - 171
  • [24] On test functions for evolutionary multi-objective optimization
    Okabe, T
    Jin, YC
    Olhofer, M
    Sendhoff, B
    PARALLEL PROBLEM SOLVING FROM NATURE - PPSN VIII, 2004, 3242 : 792 - 802
  • [25] Multi-objective Optimization of Generation Maintenance Scheduling
    Chen, X. D.
    Zhan, J. P.
    Wu, Q. H.
    Guo, C. X.
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [26] A Hardware-based Evolutionary Algorithm with Multi-Objective Optimization Operators for On-Chip Transient Fault Detection
    Merten, Marcel
    Huhn, Sebastian
    Drechsler, Rolf
    2022 IEEE 40TH VLSI TEST SYMPOSIUM (VTS), 2022,
  • [27] Constrained multi-objective test data generation based on set evolution
    Yao, Xiangjuan
    Gong, Dunwei
    Zhang, Gongjie
    IET SOFTWARE, 2015, 9 (04) : 103 - 108
  • [28] Research on Multi-objective Test Case Generation Based on Cuckoo Search
    He Haixian
    Feng Jing
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1619 - 1623
  • [29] A Multi-Objective Approach To Search-Based Test Data Generation
    Harman, Mark
    Lakhotia, Kiran
    McMinn, Phil
    GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2007, : 1098 - +
  • [30] AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction
    Nigh, Chris
    Orailoglu, Alex
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (03) : 544 - 557