Skip to main content
Log in

Method of Implanting Hardware Trojan Based on EHW in Part of Circuit

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

In view of the fact that the traditional Hardware Trojan (HT) implanting method will increase the number of logic gates, and the power consumption changes obviously, this paper proposes a method of implanting HT in part of circuit by using evolvable hardware (EHW) technology. Firstly, the hierarchical clustering method is used to decompose the large-scale circuit, and then the EHW technology is used to redesign the decomposed sub circuit to make it have HT function. Finally, the original sub circuit is replaced by the evolved circuit, so as to achieve the effect of implanting hidden HT in part of circuit. The simulation results show that compared with the direct implantation method, the power change rate of the method is reduced by 35%, and the concealment is better.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Bhunia S, Hsiao MS, Banga M, Narasimhanand S (2014) Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proc IEEE 102(8):1229–1247

    Article  Google Scholar 

  2. Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware Trojans: Lessons Learned after One Decade of Research. ACM Trans Des Autom Electron Syst 22(1):1–23

    Article  Google Scholar 

  3. Fern N, San I, Koç ÇK, Cheng KT (2017) Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality. IEEE Trans Comput-Aided Design Integr Circuits Syst 36(9):1435–1444

    Article  Google Scholar 

  4. Sepulveda J, Gross M, Zankl A, Sigl G (2017) Exploiting Bus Communication to Improve Cache Attacks on Systems-on-Chips, In: Proc. 2017 IEEE Computer Society Annual Symposium, pp 284–289

  5. Yang Y, Wu L, Yuan Y, Zhang X (2019) A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure, In: Proc. Security and Privacy in New Computing Environments, pp 647–655

  6. Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme, in Proceedings of the conference on Design, Automation and Test in Europe (DATE’2008), pp 1362–1365

  7. Yao R, Zhu P, Du J, Wang M, Zhou Z (2018) A General Low-Cost Fast Hybrid Reconfiguration Architecture for FPGA-Based Self-Adaptive System. IEICE Trans Inf Syst E101D(3):616–626

    Article  Google Scholar 

  8. Henson B, Walker JA, Trefzer MA, Tyrrell AM (2018) Designing Digital Systems Using Cartesian Genetic Programming and VHDL. Inspired by Nature 28:57–86

    Article  Google Scholar 

  9. Zhang J, Cai J, Meng Y (2018) Optimal Design of Rectification Circuit in Electronic Circuit Fault Self-repair Based on EHW and RBT. Chin J Electron 27(1):93–101

    Article  Google Scholar 

  10. Zhang J, Cai J, Meng Y (2018) The fault self-repair strategy under the various fault patterns based on EHW and RBT. WSEAS Transactions on Electronics 8:22–32

    Google Scholar 

  11. Zhang J, Cai J, Meng Y, Meng T (2016) A novel self-adaptive Circuit design technique based on evolvable hardware, International Journal of Automation and Computing pp:43473

  12. Almeida MA, Pedrino EC (2018) Hybrid Evolvable Hardware for automatic generation of image filters. Integrated Computer-Aided Engineering 25(3):289–303

    Article  Google Scholar 

  13. Miller JF, Thomson P (2000) Cartesian genetic programming, In Proceedings of the 3rd European Conference on Genetic Programming, 1802(1):121–132

  14. Zhang W, Yoshida T, Tang X, Wang Q (2010) Text clustering using frequent itemsets. Knowl-Based Syst 23(5):379–388

    Article  Google Scholar 

  15. Chuang KS, Tzeng HL, Chen S, Wu J, Chen TJ (2006) Fuzzy c-means clustering with spatial information for image segmentation. Comput Med Imaging Graph 30(1):9–15

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lijun Liu.

Additional information

Responsible Editor: C. A. Papachristou

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, L., Wang, T. & Wang, X. Method of Implanting Hardware Trojan Based on EHW in Part of Circuit. J Electron Test 37, 279–284 (2021). https://doi.org/10.1007/s10836-021-05936-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-021-05936-2

Keywords

Navigation