期刊文献+

Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm

Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
下载PDF
导出
摘要 To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
出处 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页 北京理工大学学报(英文版)
关键词 hardware Trojan logic detection combinatorial correlation coefficient test vectors hardware Trojan logic detection combinatorial correlation coefficient test vectors
  • 相关文献

参考文献3

二级参考文献63

  • 1Thomas DB. Cyclic expression of blood group determinants in murine cells and their relationship to growth control. Nature, 1971, 233∶317-321.
  • 2Wang Q, Stacy T, Binder M, et al. Disruption of the Cbfa2 gene causes necrosis and hemorrhaging in the central nervous system and blocks definitive hematopoiesis. Proc Natl Acad Sci U S A, 1996, 93∶3444-3449.
  • 3Alwine JC, Kemp DJ, Stark GR. Method for detection of specific RNAs in agarose gels by transfer to diazobenzyloxymethyl-paper and hybridization with DNA probes. Proc Natl Acad Sci U S A, 1977, 74∶5350-5354.
  • 4Veres G, Gibbs RA, Schere SE, et al. The molecular basis of the sparse fur mouse mutation. Science, 1987, 237∶415-417.
  • 5Speck NA, Stacy T, Wang Q, et al. Core-binding factor: a central player in hematopoiesis and leukemia. Cancer Res, 1999,59(Suppl)∶1789-1793.
  • 6Levanon D, Bettoun D, Harris-Cerruti C, et al. The Runx3 transcription factor regulates development and survival of TrkC dorsal root ganglia neurons. EMBO J, 2002, 21∶3454-3463.
  • 7Inoue K, Ozaki S, Shiga T, et al. Runx3 controls the axonal projection of proprioceptive dorsal root ganglion neurons. Nat Neurosci, 2002, 5∶946-954.
  • 8Look AT. Oncogenic transcription factors in the human acute leukemias. Science, 1997, 278∶1059-1064.
  • 9Li QL, Ito K, Sakakura C, et al. Causal relationship between the loss of RUNX3 expression and gastric cancer. Cell, 2002, 109∶113-124.
  • 10Levanon D, Brenner O, Negreanu V, et al. Spatial and temporal expression pattern of Runx3 (Aml2) and Runx1 (Aml1) indicates non-redundant functions during mouse embryogenesis. Mech Dev, 2001, 109∶413-417.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部