학술논문

Genetic Algorithm based Hardware Trojan Detection
Document Type
Conference
Source
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) Advanced Computing and Communication Systems (ICACCS), 2021 7th International Conference on. 1:1431-1436 Mar, 2021
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
General Topics for Engineers
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Integrated circuits
Communication systems
Benchmark testing
Hardware
Trojan horses
Test pattern generators
Genetic algorithms
Hardware Trojan
Logical Testing
transition probability
SCOAP
Genetic Algorithm
Masking
ISCAS ’85 and 89
Trigger coverage
and Trojan coverage
Language
ISSN
2575-7288
Abstract
There is an increasing concern about possible hostile modification done to ICs, which are used in various critical applications. Such malicious modifications are referred to as Hardware Trojan. A novel procedure to detect these malicious Trojans using Genetic algorithm along with the logical masking technique which masks the Trojan module when embedded is presented in this paper. The circuit features such as transition probability and SCOAP are used as suitable parameters to identify the rare nodes which are more susceptible for Trojan insertion. A set of test patterns called optimal test patterns are generated using Genetic algorithm to claim that these test vectors are more feasible to detect the presence of Trojan in the circuit under test. The proposed methodologies are validated in accordance with ISCAS ’85 and ISCAS ’89 benchmark circuits. The experimental results proven that it achieves maximum Trigger coverage, Trojan coverage and is also able to successfully mask the inserted Trojan when it is triggered by the optimal test patterns.