Welcome to Journal of Beijing Institute of Technology
Volume 27Issue 2
.
Turn off MathJax
Article Contents
Yingjian Yan, Xin Chuan. Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2018, 27(2): 230-236. doi: 10.15918/j.jbit1004-0579.201827.0210
Citation: Yingjian Yan, Xin Chuan. Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2018, 27(2): 230-236.doi:10.15918/j.jbit1004-0579.201827.0210

Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm

doi:10.15918/j.jbit1004-0579.201827.0210
  • Received Date:2017-09-19
  • To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation, an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test, the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard (AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits, the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results show that the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans, improve the probability of the hardware Trojan being activated, and also be applied to practice.
  • loading
  • [1]
    George R. Why we should worry about the supply chain[J]. International Journal of Critical Infrastructure Protection, 2015, 11: 22-23.
    [2]
    Liu Huafeng, Luo Hongwei, Wang Liwei. Survey on hardware Trojan horse[J]. Microelectronics, 2011, 41(5):709-713. (in Chinese)
    [3]
    Niu Xiaopeng, Li Qingbao, Wang Wei, et al. Survey on the hardware Trojan technologies[J]. Journal of Information Engineering University, 2012, 13(6):740-748. (in Chinese)
    [4]
    Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: Challenges and solutions[C]//IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2008.
    [5]
    Li H, Liu Q, Zhang J, et al. A survey of hardware Trojan detection, diagnosis and prevention[C]//International Conference on Computer-Aided Design and Computer Graphics, Xi'an, China, 2016.
    [6]
    Francq J, Frick F. Introduction to hardware Trojan detection methods[C]//Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2015.
    [7]
    Kitsos P, Simos D E, Torres-jimenez J, et al. Exciting FPGA cryptographic Trojans using combinatorial testing[C]//International Symposium on Software Reliability Engineering, Gaithersbury, MD, USA, 2016.
    [8]
    Pei Gen, Shi Chaoyang, Zou Xuecheng, et al. A hardware Trojan detection method based on rapid activation[J]. Application of Electronic Technique, 2016, 42(8):63-66. (in Chinese)
    [9]
    Voyiatzis A G, Stefanidis K G, Kitsos P. Efficient triggering of Trojan hardware logic[C]//IEEE International Symposium on Design & Diagnostics of Electronic Circuits & Systems, Kosice, Slovakia, 2016.
    [10]
    Kitsos P, Voyiatzis A G. Towards a hardware Trojan detection methodology[C]//Embedded Computing, Budva, Montenegro, 2014.
    [11]
    Li Ling. Research on SAT-based test generation algorithm for integrated circuits[D]. Harbin: Harbin Engineering University, 2012. (in Chinese)
    [12]
    Tang D T, Woo L S. Exhaustive test pattern generation with constant weight vectors[J]. IEEE Transactions on Computers, 1984, 32(12):1145-1150.
    [13]
    Kumar K S, Chanamala R, Sahoo S R, et al. An improved AES hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow[C]//International Symposium on VLSI Design and Test, Ahmedabad, India, 2015.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (717) PDF downloads(344) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map