A method of implanting combinational hardware Trojan based on evolvable hardware

被引:3
|
作者
Liu, Lijun [1 ]
Wang, Tao [1 ]
Wang, Xiaohan [1 ]
He, Tianyu [2 ]
机构
[1] Army Engn Univ, Shijiazhuang Campus, Shijiazhuang 050000, Hebei, Peoples R China
[2] NCO Sch Artillery & Air Def Acad, Shenyang 110000, Peoples R China
关键词
Hardware Trojan implantation; Symmetric value; Similar value; EHW; Concealment; Power consumption; GAME;
D O I
10.1016/j.compeleceng.2021.107229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to reduce the impact of Hardware Trojan (HT) implantation on the original circuit power consumption, a method using Evolvable Hardware (EHW) to implant combinational HT is proposed. First, the truth table of the original circuit is modified according to the category of HT. Secondly, the symmetric value and similar value are used to evaluate the difficulty degree of evolution, and the truth table which is easy to evolve is selected for evolution. Finally, from the various circuits generated by evolution, the circuit close to the number of logic gates and power consumption of the original circuit is selected to replace the original circuit. The obtained circuit not only includes the HT function, but also improve the anti-power detection ability. According to the experimental results, the HT implanted by EHW has smaller power consumption difference than the HT implanted by general method, and has stronger anti-power detection ability.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [32] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [33] AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction
    Nigh, Chris
    Orailoglu, Alex
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (03) : 544 - 557
  • [34] Some aspects of an evolvable hardware approach for multiple-valued combinational circuit design
    Kalganova, T
    Miller, JF
    Fogarty, TC
    EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE, 1998, 1478 : 78 - 89
  • [35] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [36] A New Testing Method for Hardware Trojan Detection
    Nejadmoghadam, Fahimeh
    Mahani, Ali
    Kavian, Yousef S.
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719
  • [37] Proposing a Novel Method for Hardware Trojan Detection
    Bazzazi, A.
    Manzuri, M. T.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (07): : 415 - 418
  • [38] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    Concurrency and Computation: Practice and Experience, 2022, 34 (21):
  • [39] Industrial applications of evolvable hardware
    Higuchi, T
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2004, 3213 : 6 - 7
  • [40] Mutation rate for evolvable hardware
    Stomeo, E
    Kalganova, T
    Lambert, C
    ENFORMATIKA, VOL 7: IEC 2005 PROCEEDINGS, 2005, : 117 - 124