Abstract
Approximate computing can accept errors in computation systems
to achieve better utilization of hardware resources. Approximate
computing has been successfully developed in integrated circuits (ICs),
such as approximate arithemtic circuits and approximate accelerators.
Unfortunately, recent works show that approximate circuits also have
security vulnerabilities. Hardware Trojan is one of the biggest threats to
hardware security. However, very limited research has been conducted
on hardware Trojans in approximate circuits. In this letter, two types of
hardware Trojans, namely Function-destructive Trojans and Informationleaking
Trojans, are presented. The Trojans are designed based on the
characteristics of approximate circuits. The effectiveness of the hardware
Trojans are analyzed using the evaluation metrics for approximate circuits.
to achieve better utilization of hardware resources. Approximate
computing has been successfully developed in integrated circuits (ICs),
such as approximate arithemtic circuits and approximate accelerators.
Unfortunately, recent works show that approximate circuits also have
security vulnerabilities. Hardware Trojan is one of the biggest threats to
hardware security. However, very limited research has been conducted
on hardware Trojans in approximate circuits. In this letter, two types of
hardware Trojans, namely Function-destructive Trojans and Informationleaking
Trojans, are presented. The Trojans are designed based on the
characteristics of approximate circuits. The effectiveness of the hardware
Trojans are analyzed using the evaluation metrics for approximate circuits.
Original language | English |
---|---|
Pages (from-to) | 197-199 |
Journal | IET Electronics Letters |
Volume | 58 |
Issue number | 5 |
Early online date | 15 Dec 2021 |
DOIs | |
Publication status | Published - Mar 2022 |