A Hardware Trojan Detection and Diagnosis Method for Gate-Level Netlists Based on Machine Learning and Graph Theory
-
Published:2023-12-21
Issue:1
Volume:13
Page:59
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Wang Junjie1, Zhai Guangxi2, Gao Hongxu2, Xu Lihui1, Li Xiang3, Li Zeyu4ORCID, Huang Zhao2ORCID, Xie Changjian5
Affiliation:
1. CNNC Xi’an Nuclear Instrument Co., Ltd., Xi’an 710061, China 2. School of Computer Science and Technology, Xidian University, Xi’an 710071, China 3. School of Decision Sciences, The Hang Seng University of Hong Kong, Hong Kong 999077, China 4. School of Computer Science and Technology, North University of China, Taiyuan 030051, China 5. Zhejiang Raina Tech. Inc., Yiwu 322000, China
Abstract
The integrated circuit (IC) supply chain has become globalized, thereby inevitably introducing hardware Trojan (HT) threats during the design stage. To safeguard the integrity and security of ICs, many machine learning (ML)-based solutions have been proposed. However, most existing methods lack consideration of the integrity of HTs, thereby resulting in lower true negative rates (TNR) and true positive rate (TPRs). Therefore, to solve these problems, this paper presents a HT detection and diagnosis method for gate-level netlists (GLNs) based on ML and graph theory (GT). In this method, to address the issue of nonuniqueness in submodule partition schemes, the concept of “Maximum Single-Output Submodule (MSOS)” and a partition algorithm are introduced. In addition, to enhance the accuracy of HT diagnosis, we design an implant node search method named breadth-first comparison (BFC). With the support of the aforementioned techniques, we have completed experiments on HT detection and diagnosis. The HT implantation examples selected in this article are sourced from Trust-Hub. The experimental results demostrate the following: (1) The detection method proposed in this article, when detecting gate-level hardware trojans (GLHTs), achieves a TPR exceeding 95%, a TNR exceeding 37%, and F1 values exceeding 97%. Compared to existing methods, this method has improved the TNR for GLHTs by at least 25%. (2) The TPR for diagnosing GLHTs is consistently above 93%, and the TNR is 100%. Compared to existing methods, this method has achieved approximately a 4% improvement in the TPR and a 15% improvement in the TNR for GLHT diagnosis.
Funder
National Natural Science Foundation of China Fundamental Research Funds for the Central Universities Natural Science Basic Research Program of Shaanxi Guangzhou Municipal Science and Technology Project Key Laboratory of Smart Human Computer Interaction and Wearable Technology of Shaanxi Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference30 articles.
1. A survey on machine learning against hardware Trojan attacks: Recent advances and challenges;Huang;IEEE Access,2020 2. Mishra, P., Bhunia, S., and Tehranipoor, M. (2017). Hardware IP Security and Trust, Springer. 3. Agrawal, D., Baktir, S., Karakoyunlu, D., and Rohatgi, P. (2007, January 20–23). Trojan detection using IC fingerprinting. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, CA, USA. 4. Jin, Y., Kupp, N., and Makris, Y. (2009, January 27–27). Experiences in hardware trojan design and implementation. Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA. 5. A novel technique for improving hardware trojan detection and reducing trojan activation time;Salmani;IEEE Trans. Very Large Scale Integr. (Vlsi) Syst.,2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|