Hardware Trojan Detection Based on Ordered Mixed Feature GEP
Abstract
In the hardware Trojan detection field, destructive reverse engineering and bypass detection are both important methods. This paper proposed an evolutionary algorithm called Ordered Mixed Feature GEP (OMF-GEP), trying to restore the circuit structure only by using the bypass information. This algorithm was developed from the basic GEP through three sets of experiments at different stages. To solve the problem, this paper transformed the GEP by introducing mixed features, ordered genes, and superchromosomes. And the experiment results show that the algorithm is effective.
References
[1]
F. Courbon, P. Loubet-Moundi, J. J. A. Fournier, and A. Tria, “SEMBA, a SEM based acquisition technique for fast invasive hardware Trojan detection,” in Proceedings of the 2015 European Conference on Circuit Theory and Design (ECCTD), pp. 1–4, Trondheim, Norway, August 2015.
[2]
C. X. Bao, D. Forte, and A. Srivastava, “On the application of one-class SVM to reverse engineering-based hardware Trojan detection,” in Proceedings of the 15th International Symposium on Quality Electronic Design (ISQED), pp. 47–54, Santa Clara, CA, USA, March 2014.
[3]
C. X. Bao, D. Forte, and A. Srivastava, “On reverse engineering-based hardware Trojan detection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 1, pp. 49–57, 2015.
[4]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, “Trojan detection using IC fingerprinting,” in Proceedings of the 2007 IEEE Symposium on Security and Piracy (SP’07), pp. 296–310, Berkeley, CA, USA, May 2007.
[5]
K. Xiao, X. Zhang, and M. Tehranipoor, “A clock sweeping technique for detecting hardware Trojans impacting circuits delay,” IEEE Design & Test, vol. 30, no. 2, pp. 26–34, 2013.
[6]
J. Aarestad, D. Acharyya, R. Rad, and J. Plusquellic, “Detecting Trojans through leakage current analysis using multiple supply pad IDDQs,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 893–904, 2010.
[7]
A. N. Nowroz, K. Hu, F. Koushanfar, and S. Reda, “Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1792–1805, 2014.
[8]
B. Y. Zhou, R. Adato, M. Zangeneh et al., “Detecting hardware Trojans using backside optical imaging of embedded watermarks,” in Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15), pp. 1–6, San Francisco, CA, USA, June 2015.
[9]
J. He, Y. Zhao, X. Guo, and Y. Jin, “Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 10, pp. 2939–2948, 2017.
[10]
D. Li, C. Shen, X. Dai et al., “Research on data fusion of adaptive weighted multi-source sensor,” Computers, Materials & Continua, vol. 61, no. 3, pp. 1217–1231, 2019.
[11]
Y. Jiang, W. Jiang, J. Chen et al., “A new method based on evolutionary algorithm for symbolic network weak unbalance,” Journal on Internet of Things, vol. 1, no. 2, pp. 41–53, 2019.
[12]
A. Y. Hamed, M. H. Alkinani, and M. R. Hassan, “A genetic algorithm optimization for multi-objective multicast routing,” Intelligent Automation & Soft Computing, vol. 26, no. 6, pp. 1201–1216, 2020.
[13]
F.-I. Chou, W.-H. Ho, and C.-H. Chen, “Niche genetic algorithm for solving multiplicity problems in genetic association studies,” Intelligent Automation & Soft Computing, vol. 26, no. 3, pp. 501–512, 2020.
[14]
H. Zhi and S. Liua, “A hybrid GABC-GA algorithm for mechanical design optimization problems,” Intelligent Automation and Soft Computing, vol. 25, no. 4, pp. 815–825, 2019.
[15]
C. Ferreira, “Gene expression programming: a new adaptive algorithm for solving problems,” Complex Systems, vol. 13, no. 2, pp. 87–129, 2001.
[16]
T. Higuchi, M. Murakawa, M. Iwata et al., “Evolvable hardware at function level,” in Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC ‘97), pp. 187–192, Indianapolis, IN, USA, April 1997.
[17]
T. Higuchi, M. Iwata, I. Kajitani et al., “Evolvable hardware and its application to pattern recognition and fault-tolerant systems,” in Towards Evolvable Hardware, pp. 118–135, Springer, Berlin, Germany, 1996.
[18]
V. Vassilev, D. Job, and J. Miller, “Towards the automatic design of more efficient digital circuits,” in Proceedings of the 2nd NASA/DOD Workshop on Evolvable Hardware, pp. 151–160, Palo Alto, CA, USA, July 2000.
[19]
G. W. Timothy and J. B. Peter, “Towards development in evolvable hardware,” in Proceedings of the 3rd NASA/DOD Workshop on Evolvable Hardware Pasadena, pp. 241–250, Alexandria, VA, USA, July 2002.
[20]
M. Erbo, R. Rossi, V. Liberali, and A. G. B. Tettamanzi, “Digital filter design through simulated evolution,” in Proceedings of the European Conference on Circuit Theory and Design, pp. 389–393, Espoo, Finland, August 2001.
[21]
H. Hemmi, J. Mizoguchi, and K. Shimohara, “Development and evolution of hard ware behaviors,” in Proceedings of the Artificial Life IV, pp. 250–265, Cambridge, MA, USA, July 1994.
[22]
B. Hounsell and T. Arslan, “A novel evolvable hardware framework for the evolution of high performance digital circuits,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ‘00), pp. 525–529, Las Vegas, NV, USA, July 2000.
Index Terms
- Hardware Trojan Detection Based on Ordered Mixed Feature GEP
Index terms have been assigned to the content through auto-classification.
Recommendations
A Survey of Hardware Trojan Taxonomy and Detection
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. This article presents a classification of hardware Trojans and a survey of published ...
A Feature-Adaptive and Scalable Hardware Trojan Detection Framework For Third-party IPs Utilizing Multilevel Feature Analysis and Random Forest
AbstractThe trustworthiness of integrated circuits is susceptible to the hardware Trojans in the third-party intellectual property (IP) cores. Various hardware Trojan detection approaches have been proposed to identify the Trojans from a given netlist at ...
Comments
Information & Contributors
Information
Published In
Copyright © 2021 Huan Zhang et al.
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Published: 01 January 2021
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025