Hardware Trojan Detection Based on Path Feature and Support Vector Machine

被引:2
|
作者
Yan, Feng [1 ]
Lan, Chen [1 ]
机构
[1] Chinese Acad Sci, Inst Microelect, Beijing 100029, Peoples R China
关键词
Hardware Trojan; Path feature; Support Vector Machine (SVM); Static weighting;
D O I
10.11999/JEIT220500
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware Trojan attack has become a serious threat to Integrated Circuit(IC). Hardware Trojans are hidden, rare triggered and the data-sets of Trojan benchmarks are unbalanced, a hardware Trojan detection method that performs a static analysis in gate-level netlist is presented. The path-feature based on the principle of design-for-test is proposed to simplify the analysis of feature. Based on the path-feature extracted in a circuit, the nets are classified into two groups with the Support Vector Machine (SVM) machine learning. It uses the double-weighting method of training-set to improve the performance of the classifier. Experimental results demonstrate that this method can be used to detect the suspicious nets in circuits and the ACCuracy (ACC) can achieve up to 99.85%.The static weighting method improves the performance of the classifier and the improvement of accuracy can achieve up 5.58%. Compared with the existing reference, the size of feature is only 36%, True Positive Rate (TPR) is decreased by 1.07%, True Negative Rate (TNR) is increased by 2.74% and ACC is increased by 2.92% respectively. This work verifies the efficiency of path-feature and SVM machine learning for Hardware Trojan detection and clarifies the relationship between the balance of data-sets and the detection performance.
引用
收藏
页码:1921 / 1932
页数:12
相关论文
共 22 条
  • [1] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [2] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
  • [3] Goldstein L. H., 1980, Proceedings of the 17th Design Automation Conference, P190, DOI 10.1145/800139.804528
  • [4] Hasegawa K., 2018, International Conference on Consumer Electronics, P1, DOI [10.1109/ICCE.2018.8326247, DOI 10.1109/ICCE.2018.8326247]
  • [5] Hasegawa K, 2017, IEEE INT SYMP CIRC S, P2154
  • [6] Hasegawa K, 2017, IEEE INT ON LINE, P227, DOI 10.1109/IOLTS.2017.8046227
  • [7] A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features
    Hasegawa, Kento
    Yanagisawa, Masao
    Togawa, Nozomu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (07) : 1427 - 1438
  • [8] Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
  • [9] A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges
    Huang, Zhao
    Wang, Quan
    Chen, Yin
    Jiang, Xiaohong
    [J]. IEEE ACCESS, 2020, 8 : 10796 - 10826
  • [10] Survey of Recent Developments for Hardware Trojan Detection
    Jain, Ayush
    Zhou, Ziqi
    Guin, Ujjwal
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,