The Natural Way to Evolve Hardware
نویسندگان
چکیده
Arti cial evolution can automatically derive the con g uration of a recon gurable hardware system such that it performs a given task Individuals of the evolving popu lation are evaluated when instantiated as real circuits so if constraints inherent to human design but not to evolu tion are dropped then the natural physical dynamics of the hardware can be exploited in new ways The notion of an arti cially evolving species SAGA allows the open ended incremental evolution of complex circuits Theoretical ar guments are given as well as the real world example of an evolved hardware robot controller
منابع مشابه
Evolution in materio: Looking Beyond the Silicon Box
It is argued that natural evolution is, par excellence, an algorithm that exploits the physical properties of materials. Such an exploitation of the physical characteristics has already been demonstrated in intrinsic evolution of electronic circuits. This paper is an attempt to point the way toward the exciting possibility of using artificial evolution to directly exploit the properties of mate...
متن کاملImproving evolvable hardware by applying the speciation technique
Evolvable hardware (EHW) has recently become a highly attractive topic of study because it offers a way of adapting hardware to a given embedded environment. However, it is not easy to evolve hardware efficiently and effectively, so many challenges continue to exist when trying to solve problems. In this paper, we propose a method that uses the speciation technique to enable diverse circuits to...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کامل