Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Hardware Trojan Detection Based on Ordered Mixed Feature GEP

Published: 01 January 2021 Publication History

Abstract

In the hardware Trojan detection field, destructive reverse engineering and bypass detection are both important methods. This paper proposed an evolutionary algorithm called Ordered Mixed Feature GEP (OMF-GEP), trying to restore the circuit structure only by using the bypass information. This algorithm was developed from the basic GEP through three sets of experiments at different stages. To solve the problem, this paper transformed the GEP by introducing mixed features, ordered genes, and superchromosomes. And the experiment results show that the algorithm is effective.

References

[1]
F. Courbon, P. Loubet-Moundi, J. J. A. Fournier, and A. Tria, “SEMBA, a SEM based acquisition technique for fast invasive hardware Trojan detection,” in Proceedings of the 2015 European Conference on Circuit Theory and Design (ECCTD), pp. 1–4, Trondheim, Norway, August 2015.
[2]
C. X. Bao, D. Forte, and A. Srivastava, “On the application of one-class SVM to reverse engineering-based hardware Trojan detection,” in Proceedings of the 15th International Symposium on Quality Electronic Design (ISQED), pp. 47–54, Santa Clara, CA, USA, March 2014.
[3]
C. X. Bao, D. Forte, and A. Srivastava, “On reverse engineering-based hardware Trojan detection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 1, pp. 49–57, 2015.
[4]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, “Trojan detection using IC fingerprinting,” in Proceedings of the 2007 IEEE Symposium on Security and Piracy (SP’07), pp. 296–310, Berkeley, CA, USA, May 2007.
[5]
K. Xiao, X. Zhang, and M. Tehranipoor, “A clock sweeping technique for detecting hardware Trojans impacting circuits delay,” IEEE Design & Test, vol. 30, no. 2, pp. 26–34, 2013.
[6]
J. Aarestad, D. Acharyya, R. Rad, and J. Plusquellic, “Detecting Trojans through leakage current analysis using multiple supply pad IDDQs,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 893–904, 2010.
[7]
A. N. Nowroz, K. Hu, F. Koushanfar, and S. Reda, “Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1792–1805, 2014.
[8]
B. Y. Zhou, R. Adato, M. Zangeneh et al., “Detecting hardware Trojans using backside optical imaging of embedded watermarks,” in Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15), pp. 1–6, San Francisco, CA, USA, June 2015.
[9]
J. He, Y. Zhao, X. Guo, and Y. Jin, “Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 10, pp. 2939–2948, 2017.
[10]
D. Li, C. Shen, X. Dai et al., “Research on data fusion of adaptive weighted multi-source sensor,” Computers, Materials & Continua, vol. 61, no. 3, pp. 1217–1231, 2019.
[11]
Y. Jiang, W. Jiang, J. Chen et al., “A new method based on evolutionary algorithm for symbolic network weak unbalance,” Journal on Internet of Things, vol. 1, no. 2, pp. 41–53, 2019.
[12]
A. Y. Hamed, M. H. Alkinani, and M. R. Hassan, “A genetic algorithm optimization for multi-objective multicast routing,” Intelligent Automation & Soft Computing, vol. 26, no. 6, pp. 1201–1216, 2020.
[13]
F.-I. Chou, W.-H. Ho, and C.-H. Chen, “Niche genetic algorithm for solving multiplicity problems in genetic association studies,” Intelligent Automation & Soft Computing, vol. 26, no. 3, pp. 501–512, 2020.
[14]
H. Zhi and S. Liua, “A hybrid GABC-GA algorithm for mechanical design optimization problems,” Intelligent Automation and Soft Computing, vol. 25, no. 4, pp. 815–825, 2019.
[15]
C. Ferreira, “Gene expression programming: a new adaptive algorithm for solving problems,” Complex Systems, vol. 13, no. 2, pp. 87–129, 2001.
[16]
T. Higuchi, M. Murakawa, M. Iwata et al., “Evolvable hardware at function level,” in Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC ‘97), pp. 187–192, Indianapolis, IN, USA, April 1997.
[17]
T. Higuchi, M. Iwata, I. Kajitani et al., “Evolvable hardware and its application to pattern recognition and fault-tolerant systems,” in Towards Evolvable Hardware, pp. 118–135, Springer, Berlin, Germany, 1996.
[18]
V. Vassilev, D. Job, and J. Miller, “Towards the automatic design of more efficient digital circuits,” in Proceedings of the 2nd NASA/DOD Workshop on Evolvable Hardware, pp. 151–160, Palo Alto, CA, USA, July 2000.
[19]
G. W. Timothy and J. B. Peter, “Towards development in evolvable hardware,” in Proceedings of the 3rd NASA/DOD Workshop on Evolvable Hardware Pasadena, pp. 241–250, Alexandria, VA, USA, July 2002.
[20]
M. Erbo, R. Rossi, V. Liberali, and A. G. B. Tettamanzi, “Digital filter design through simulated evolution,” in Proceedings of the European Conference on Circuit Theory and Design, pp. 389–393, Espoo, Finland, August 2001.
[21]
H. Hemmi, J. Mizoguchi, and K. Shimohara, “Development and evolution of hard ware behaviors,” in Proceedings of the Artificial Life IV, pp. 250–265, Cambridge, MA, USA, July 1994.
[22]
B. Hounsell and T. Arslan, “A novel evolvable hardware framework for the evolution of high performance digital circuits,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ‘00), pp. 525–529, Las Vegas, NV, USA, July 2000.

Index Terms

  1. Hardware Trojan Detection Based on Ordered Mixed Feature GEP
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Security and Communication Networks
    Security and Communication Networks  Volume 2021, Issue
    2021
    10967 pages
    ISSN:1939-0114
    EISSN:1939-0122
    Issue’s Table of Contents
    This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

    Publisher

    John Wiley & Sons, Inc.

    United States

    Publication History

    Published: 01 January 2021

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media