1. School of Microelectronics, Tianjin University, Tianjin 300072, China 2. Tianjin Key Laboratory of Imaging and Sensing Microelectronic Technology, Tianjin University, Tianjin 300072, China 3. Beijing Engineering Research Center of High-reliability IC with Power Industrial Grade, Beijing Smart-Chip Microelectronics Technology Co. Ltd, Beijing 100192, China
In order to improve the identification level of hardware Trojan, a rare node activity improvement method based on genetic algorithm was proposed, by using the global searching ability of genetic algorithm. The proposed method was used to search the test vector sets which could improve the activity of rare nodes, by taking the toggle count of rare nodes as activity. Under the excitation of the test vector, the transition count of rare nodes in device under test (DUT) was taken as fitness, and the operations of selection, crossover and mutation were conducted during the whole test vector space. The fitness of parent and the fitness of offspring were compared, and the higher fitness test vector sets were saved, and eventually the optimized test vector set was generated by iteration when the iteration termination condition was reached. Simulation verification was conducted with the ISCAS'85 benchmark circuit c3540 as research object. Results showed that before the operation of the algorithm, when 1 000 vectors were used as input, the sum of the transition times of the un-rare nodes was 155 158, and the sum of the transition times of the rare nodes was 117. After the operation of the algorithm, when 1 000 vectors were used as input, the sum of the transition times of the un-rare nodes was 157 146, and the sum of the transition times of the rare nodes was 882. The test vectors generated by genetic algorithm improved the transition rate of rare nodes up to 7.54 times, and increased the relative transition rate of rare nodes up to 7.44 times.
Fig.4Variation of population fitness with calculation times
节点名称
逻辑0时间
逻辑1时间
P
G3537
11
989
0.022
n456
24
976
0.048
n651
908
92
0.184
n641
915
85
0.170
n415
911
89
0.176
n457
25
975
0.050
n433
907
93
0.186
n471
23
977
0.046
Tab.2Dynamic transition rate of rare nodes after optimization
Fig.5Distribution of nodes' transition rate before and after algorithm operation
[1]
AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan detection using IC fingerprinting [C]// IEEE Symposium on Security and Privacy. [S.l.]: IEEE, 2007: 296-310.
[2]
TEHRANIPOOR M, KOUSHANFAR F A survey of hardware Trojan taxonomy and detection[J]. IEEE Design and Test of Computers, 2010, 27 (1): 10- 25
doi: 10.1109/MDT.2010.7
[3]
BHUNIA S, HSIAO M S, BANGA M, et al Hardware Trojan attacks: threat analysis and countermeasures[J]. Proceedings of the IEEE, 2014, 102 (8): 1229- 1247
doi: 10.1109/JPROC.2014.2334493
[4]
SAAD W, SANJAB A, WANG Y, et al Hardware Trojan detection game: a prospect-theoretic approach[J]. IEEE Transactions on Vehicular Technology, 2017, 66 (9): 7697- 7710
doi: 10.1109/TVT.2017.2686853
[5]
JACOB N, MERLI D, HEYSZL J, et al Hardware Trojans: current challenges and approaches[J]. IET Computers and Digital Techniques, 2014, 8 (6): 264- 273
doi: 10.1049/iet-cdt.2014.0039
[6]
CHAKRABORTY R S, PAGLIARINI S, MATHEW J, et al A flexible online checking technique to enhance hardware Trojan horse detectability by reliability analysis[J]. IEEE Transactions on Emerging Topics in Computing, 2017, 5 (2): 260- 270
[7]
CHAKRABORTY R S, WOLFF F, PAUL S, et al. MERO: a statistical approach for hardware Trojan detection [C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin : Springer, 2009: 396-410.
[8]
WANG S J, WEI J Y, HUANG S H, et al. Test gene-ration for combinational hardware Trojans [C]// Hardware-Oriented Security and Trust. [S.l.]: IEEE, 2016: 1-6.
[9]
XUE M, HU A, LI G. Detecting hardware Trojan through heuristic partition and activity driven test pattern generation [C]// Communications Security Conference. [S.l.]: IET, 2014: 1-6.
[10]
YE X, FENG J, GONG H, et al. An anti-Trojans design approach based on activation probability analysis [C]// Electron Devices and Solid-state Circuits. [S.l.]: IEEE, 2015: 443-446.
[11]
HAN C, WANG L, ZHANG Z, et al A multi-objective genetic algorithm based on fitting and interpolation[J]. IEEE Access, 2018, 6: 22920- 22929
doi: 10.1109/ACCESS.2018.2829262
[12]
MICHALEWICZ Z A non-standard genetic algorithm for the nonlinear transportation problem[J]. Informs Journal on Computing, 2017, 3 (4): 307- 316
[13]
LIN C T, PRASAD M, SAXENA A An improved polynomial neural network classifier using real-coded genetic algorithm[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2017, 45 (11): 1389- 1401
[14]
MASMOUDI M A, BRAEKERS K, MASMOUDI M, et al A hybrid genetic algorithm for the heterogeneous dial-a-ride problem[J]. Computers and Operations Research, 2017, 81: 1- 13
[15]
FRIEDRICH T, K?TZING T, KREJCA M S, et al The compact genetic algorithm is efficient under extreme Gaussian noise[J]. IEEE Transactions on Evolutionary Computation, 2017, 21 (3): 477- 490