Structural and SCOAP Features Based Approach for Hardware Trojan Detection Using SHAP and Light Gradient Boosting Model

被引:1
作者
Sharma, Richa [1 ]
Sharma, G. K. [1 ]
Pattanaik, Manisha [1 ]
Prashant, V. S. S. [1 ]
机构
[1] Indian Inst Informat Technol & Management, ABV, Gwalior 474015, India
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2023年 / 39卷 / 04期
关键词
Hardware trojan; Structural & SCOAP features; Machine learning; SHAP; Light gradient boosting; THREAT;
D O I
10.1007/s10836-023-06080-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware Trojan (HT) is the most critical threat due to outsourcing of Integrated circuit designing phases. Existing machine learning-based HT detection techniques at the pre-silicon IC phase use the structural or SCOAP gate-level netlist features for detection. However, these techniques either fail to detect the always-on-Trojans or low SCOAP Trojans, thus provides large false positives/negatives. Moreover, they fail to interpret the model prediction locally due to model-specific feature importances, identify the best feature subset in large retraining rounds, and also drop some relevant features. Therefore, to tackle these limitations, this paper proposes a new technique that utilizes structural and SCOAP features to detect HT from the gate-level netlist. The proposed technique utilizes the fastest model Light Gradient Boosting that uses gradient-based one-side sampling and exclusive feature bundling to reduce the computational time. Further, a model agnostic Shapley additive explanations (SHAP) is employed to identify each feature global and local impact on model prediction, thus making the prediction transparent. Moreover, a quartile-based feature selection method is proposed, which uses SHAP to identify the optimal feature set by keeping low retraining rounds. Experimental results show that the proposed technique accurately detects always-on-Trojans and HT nets from Trust-Hub, DeTrust, DeTest and MIMIC based Trojan benchmarks.
引用
收藏
页码:465 / 485
页数:21
相关论文
共 53 条
  • [1] Abdi H., 2007, ENCY MEASUREMENT STA, V2, P508, DOI DOI 10.4135/9781412952644.N239
  • [2] AdamWaksman Matthew Suozzo, 2013, P 2013 ACM SIGSAC C, P697
  • [3] [Anonymous], 2017, P IEEE INT S CIRC SY
  • [4] Batista G. E., 2003, 2 BRAZ WORKSH BIOINF, V3, P10
  • [5] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
  • [6] Boosting for high-dimensional two-class prediction
    Blagus, Rok
    Lusa, Lara
    [J]. BMC BIOINFORMATICS, 2015, 16
  • [7] Hardware Trojan: Threats and Emerging Solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    [J]. 2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
  • [8] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [9] Clark Gradeigh D., 2017, 2017 IEEE Conference on Communications and Network Security (CNS), P1, DOI 10.1109/CNS.2017.8228644
  • [10] Cruz Jonathan, 2022, 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), P1, DOI 10.1109/AsianHOST56390.2022.10022234