Title | Genetic Algorithm based Hardware Trojan Detection |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Sai Sruthi, Ch, Lohitha, M, Sriniketh, S.K, Manassa, D, Srilakshmi, K, Priyatharishini, M |
Conference Name | 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) |
Date Published | mar |
Keywords | and Trojan coverage, Benchmark testing, Communication systems, composability, genetic algorithm, genetic algorithms, Hardware, hardware trojan, integrated circuits, ISCAS ’85 and 89, Logical Testing, masking, pubcrawl, resilience, Resiliency, SCOAP, Test pattern generators, transition probability, Trigger coverage, trojan horse detection, Trojan horses |
Abstract | There is an increasing concern about possible hostile modification done to ICs, which are used in various critical applications. Such malicious modifications are referred to as Hardware Trojan. A novel procedure to detect these malicious Trojans using Genetic algorithm along with the logical masking technique which masks the Trojan module when embedded is presented in this paper. The circuit features such as transition probability and SCOAP are used as suitable parameters to identify the rare nodes which are more susceptible for Trojan insertion. A set of test patterns called optimal test patterns are generated using Genetic algorithm to claim that these test vectors are more feasible to detect the presence of Trojan in the circuit under test. The proposed methodologies are validated in accordance with ISCAS '85 and ISCAS '89 benchmark circuits. The experimental results proven that it achieves maximum Trigger coverage, Trojan coverage and is also able to successfully mask the inserted Trojan when it is triggered by the optimal test patterns. |
DOI | 10.1109/ICACCS51430.2021.9441738 |
Citation Key | sai_sruthi_genetic_2021 |