Design and analysis of hardware Trojans in approximate circuits

Yuqin Dou, Chenghua Wang, Chongyan Gu, Maire O'Neill, Weiqiang Liu

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)
79 Downloads (Pure)

Abstract

Approximate computing can accept errors in computation systems
to achieve better utilization of hardware resources. Approximate
computing has been successfully developed in integrated circuits (ICs),
such as approximate arithemtic circuits and approximate accelerators.
Unfortunately, recent works show that approximate circuits also have
security vulnerabilities. Hardware Trojan is one of the biggest threats to
hardware security. However, very limited research has been conducted
on hardware Trojans in approximate circuits. In this letter, two types of
hardware Trojans, namely Function-destructive Trojans and Informationleaking
Trojans, are presented. The Trojans are designed based on the
characteristics of approximate circuits. The effectiveness of the hardware
Trojans are analyzed using the evaluation metrics for approximate circuits.
Original languageEnglish
Pages (from-to)197-199
JournalIET Electronics Letters
Volume58
Issue number5
Early online date15 Dec 2021
DOIs
Publication statusPublished - Mar 2022

Fingerprint

Dive into the research topics of 'Design and analysis of hardware Trojans in approximate circuits'. Together they form a unique fingerprint.

Cite this