On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

Abstract Evolvable hardware (EH) architectures are capable of changing their configuration and behavior dynamically based on inputs from the environment. In this paper, we investigate the feasibility of using EH to prevent Hardware Trojan Horses (HTHs) from being inserted, activated, or propagated in a digital electronic chip. HTHs are malicious hardware components that intend to leak secret information or cause malfunctioning at run-time in the chip in which they are integrated. We hypothesize that EH can detect internal circuit errors at run-time and reconfigure to a state in which the errors are no longer present. We implement a Virtual Reconfigurable Circuit (VRC) on a Field-Programmable Gate Array (FPGA) that autonomously and periodically reconfigures itself based on an Evolutionary Algorithm (EA). New VRC configurations are generated with an on-chip EA engine. We show that the presented approach is applicable in a scenario in which (1) the HTH-critical areas in the circuit are known in advance, and (2) the VRC is a purely combinatorial circuit, as opposed to the on-chip memory holding the golden reference, which requires one or more cycles to be read/written. We compare two different approaches for protecting the system against HTHs: Genetic Programming (GP) and Cartesian Genetic Programming (CGP). The paper reports on experiments on four benchmark circuits and gives an overview of both the limitations and the added value of the presented approaches.

[1]  Muhammad Irfan,et al.  Combinational digital circuit synthesis using Cartesian Genetic Programming from a NAND gate template , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[2]  Zhiguo Bao,et al.  A new approach for circuit design optimization using Genetic Algorithm , 2008, 2008 International SoC Design Conference.

[3]  Sharareh Zamanzadeh,et al.  Security Path: An Emerging Design Methodology to Protect the FPGA IPs Against Passive/Active Design Tampering , 2016, J. Electron. Test..

[4]  Julian Francis Miller,et al.  Cartesian genetic programming , 2000, GECCO '10.

[5]  Arnav Gupta,et al.  Design and simulation of virtual reconfigurable circuit for a Fault Tolerant System , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[6]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[7]  Eduardo de la Torre,et al.  Self-Reconfigurable Evolvable Hardware System for Adaptive Image Processing , 2013, IEEE Transactions on Computers.

[8]  Christof Paar,et al.  A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks , 2016, CHES.

[9]  Wolfgang Banzhaf,et al.  The evolution of genetic code in Genetic Programming , 1999 .

[10]  Christof Paar,et al.  Stealthy dopant-level hardware Trojans: extended version , 2013, Journal of Cryptographic Engineering.

[11]  Steven Trimberger Trusted Design in FPGAs , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[12]  A. E. Eiben,et al.  Introduction to Evolutionary Computing , 2003, Natural Computing Series.

[13]  N. Balaji,et al.  Approximation of digital circuits using cartesian genetic programming , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).

[14]  Jin Wang,et al.  Implementing Multi-VRC Cores to Evolve Combinational Logic Circuits in Parallel , 2007, ICES.

[15]  Laurent Njilla,et al.  Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[16]  Kyrre Glette,et al.  Design and Implementation of Scalable Online Evolvable Hardware Pattern Recognition Systems , 2008 .

[17]  Swarup Bhunia,et al.  Design and Validation for FPGA Trust under Hardware Trojan Attacks , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[18]  Debdeep Mukhopadhyay,et al.  Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications , 2017, Microprocess. Microsystems.

[19]  Jeyavijayan Rajendran,et al.  Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.

[20]  Domagoj Jakobovic,et al.  Automated design of combinatorial logic circuits , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[21]  John Kalomiros,et al.  A Cartesian Genetic Programming Approach for evolving Optimal Digital Circuits , 2016 .

[22]  Mansoureh Labbafniya,et al.  Secure FPGA Design by Filling Unused Spaces , 2019, ISC Int. J. Inf. Secur..

[23]  Adrian Stoica,et al.  Fault-tolerant evolvable hardware using field-programmable transistor arrays , 2000, IEEE Trans. Reliab..

[24]  Mark Mohammad Tehranipoor,et al.  MUTARCH: Architectural diversity for FPGA device and IP security , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).

[25]  Saar Drimer,et al.  Volatile FPGA design security { a survey , 2008 .

[26]  A. Swarnalatha,et al.  Complete hardware evolution based SoPC for evolvable hardware , 2014, Appl. Soft Comput..

[27]  Elena Dubrova,et al.  Keyed logic BIST for Trojan detection in SoC , 2014, 2014 International Symposium on System-on-Chip (SoC).

[28]  Ramesh Karri,et al.  FPGA Trust Zone: Incorporating trust and reliability into FPGA designs , 2016, 2016 IEEE 34th International Conference on Computer Design (ICCD).

[29]  Giorgio Di Natale,et al.  A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans , 2014, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS).

[30]  Claudio Moraga,et al.  Evolutionary design of digital circuits using improved multi expression programming (IMEP) , 2007 .

[31]  Julian Francis Miller,et al.  A multi-chromosome approach to standard and embedded cartesian genetic programming , 2006, GECCO.

[32]  Heder S. Bernardino,et al.  Cartesian Genetic Programming with Crossover for Designing Combinational Logic Circuits , 2018, 2018 7th Brazilian Conference on Intelligent Systems (BRACIS).

[33]  Eduardo de la Torre,et al.  Power-aware multi-objective evolvable hardware system on an FPGA , 2014, 2014 NASA/ESA Conference on Adaptive Hardware and Systems (AHS).

[34]  Robert E. Lyons,et al.  The Use of Triple-Modular Redundancy to Improve Computer Reliability , 1962, IBM J. Res. Dev..

[35]  Ahmad Patooghy,et al.  Hardware enlightening: No where to hide your Hardware Trojans! , 2016, 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS).

[36]  J. Miller An empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach , 1999 .

[37]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[38]  Adrian Thompson,et al.  An Evolved Circuit, Intrinsic in Silicon, Entwined with Physics , 1996, ICES.

[39]  Lukás Sekanina,et al.  An Evolvable Combinational Unit for FPGAs , 2004, Comput. Artif. Intell..