Investigate of Mitigation Solution against Hardware Trojans Attack on Evolvable Hardware Platform

被引:1
|
作者
Li, Zeyu [1 ]
Huang, Zhao [1 ]
Wang, Junjie [1 ]
Wang, Quan [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Evolvable Hardware Platform (EHWP); Hardware Trojans (HTs); Hardware Security; Evolutionary Algorithm (EA);
D O I
10.1109/ISOCC56007.2022.10031367
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An evolvable hardware platform (EHWP) based on programmable devices can realize specific hardware function structures by changing the bitstreams. As EHWP becomes more and more widely used in security chips, issues related to hardware security have received focused attention, especially hardware Trojans (HTs). However, current research has focused on implementing defense against HTs in the underlying hardware, with very sparse mitigation solutions for HTs in the overlay/middleware layer. Given this, we attempt to implement an HTs mitigation solution using the characteristics of the EHWP. Specifically, we utilize evolutionary algorithm (EA) to explore new circuit structures to replace the HTs-infected resources, thus avoiding the related security issues. The experimental results show that the scheme proposed in this paper can effectively mitigate the HTs on EHWP.
引用
收藏
页码:213 / 214
页数:2
相关论文
共 50 条
  • [1] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware
    Li, Zeyu
    Wang, Junjie
    Huang, Zhao
    Luo, Nan
    Wang, Quan
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [2] Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures
    Boraten, Travis
    Kodi, Avinash Karanth
    [J]. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, : 1091 - 1100
  • [3] A flexible platform for evolvable hardware
    Wang, CJ
    [J]. CAD/ GRAPHICS TECHNOLOGY AND ITS APPLICATIONS, PROCEEDINGS, 2003, : 401 - 402
  • [4] Hardware Trojans: The Defense and Attack of Integrated Circuits
    Reece, Trey
    Robinson, William H.
    [J]. 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
  • [5] Evolvable Hardware for Fault Mitigation in Control Circuits
    Deepanjali, S.
    Shaik, Ayesha
    Mahammad, Noor Sk
    Beautlin, S.
    [J]. PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 672 - 677
  • [6] A Novel Tampering Attack on AES Cores with Hardware Trojans
    Jain, Ayush
    Guin, Ujjwal
    [J]. 2020 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2020), 2020, : 77 - 82
  • [7] PCB Hardware Trojans: Attack Modes and Detection Strategies
    McGuire, Matthew
    Ogras, Umit
    Ozev, Sule
    [J]. 2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,
  • [8] DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
    Oriero, Enahoro
    Khalid, Faiq
    Hasan, Syed Rafay
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 47 - 55
  • [9] Using Approximate Circuits Against Hardware Trojans
    Martin, Honorio
    Dupuis, Sophie
    Di Natale, Giorgio
    Entrena, Luis
    [J]. IEEE DESIGN & TEST, 2023, 40 (03) : 8 - 16
  • [10] Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip
    Bobda, Christophe
    Mead, Joshua
    Whitaker, Taylor J. L.
    Kamhoua, Charles
    Kwiat, Kevin
    [J]. APPLIED RECONFIGURABLE COMPUTING, 2017, 10216 : 47 - 59