A method of implanting combinational hardware Trojan based on evolvable hardware

被引:3
|
作者
Liu, Lijun [1 ]
Wang, Tao [1 ]
Wang, Xiaohan [1 ]
He, Tianyu [2 ]
机构
[1] Army Engn Univ, Shijiazhuang Campus, Shijiazhuang 050000, Hebei, Peoples R China
[2] NCO Sch Artillery & Air Def Acad, Shenyang 110000, Peoples R China
关键词
Hardware Trojan implantation; Symmetric value; Similar value; EHW; Concealment; Power consumption; GAME;
D O I
10.1016/j.compeleceng.2021.107229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to reduce the impact of Hardware Trojan (HT) implantation on the original circuit power consumption, a method using Evolvable Hardware (EHW) to implant combinational HT is proposed. First, the truth table of the original circuit is modified according to the category of HT. Secondly, the symmetric value and similar value are used to evaluate the difficulty degree of evolution, and the truth table which is easy to evolve is selected for evolution. Finally, from the various circuits generated by evolution, the circuit close to the number of logic gates and power consumption of the original circuit is selected to replace the original circuit. The obtained circuit not only includes the HT function, but also improve the anti-power detection ability. According to the experimental results, the HT implanted by EHW has smaller power consumption difference than the HT implanted by general method, and has stronger anti-power detection ability.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Evolvable hardware with development
    Kitano, H
    ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 4, 1996, : 33 - 36
  • [22] Transition Probabilistic Approach for Detection and Diagnosis of Hardware Trojan in Combinational Circuits
    Popat, Jayesh
    Mehta, Usha
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [23] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [24] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware
    Li, Zeyu
    Wang, Junjie
    Huang, Zhao
    Luo, Nan
    Wang, Quan
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [25] Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
    Yingjian Yan
    Xin Chuan
    Journal of Beijing Institute of Technology, 2018, 27 (02) : 230 - 236
  • [26] Hardware Trojan detection method based on combined features analysis
    Zhao Y.
    Li B.
    Ma H.
    He J.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6
  • [27] An evolvable hardware method based on elite Partheno-Genetic Algorithm
    Liu, Lijun
    Wang, Tao
    APPLIED SOFT COMPUTING, 2021, 113
  • [28] Recognition method of road speed limit sign based on evolvable hardware
    Wang J.
    Kang X.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2011, 32 (06): : 689 - 694
  • [29] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [30] FPGA-based Systems for Evolvable Hardware
    Lambert, Cyrille
    Kalganova, Tatiana
    Stomeo, Emanuele
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 12, 2006, 12 : 123 - +