Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests

被引:25
作者
Kurihara, Tatsuki [1 ]
Togawa, Nozomu [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Commun Engn, Tokyo, Japan
来源
2021 IEEE 27TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS) | 2021年
关键词
hardware Trojan; hardware security; netlist; machine learning; random forest;
D O I
10.1109/IOLTS52814.2021.9486700
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert malicious circuits, called hardware Trojans, into their products, developing an effective hardware Trojan detection method is strongly required. In this paper, we propose 25 hardware-Trojan features based on the structure of trigger circuits for machine-learning-based hardware Trojan detection. Combining the proposed features into 11 existing hardware-Trojan features, we totally utilize 36 hardware-Trojan features for classification. Then we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on the random-forest classifier. The experimental results demonstrate that the average true positive rate (TPR) becomes 63.6% and the average true negative rate (TNR) becomes 100.0%. They improve the average TPR by 14.7 points while keeping the average TNR compared to existing state-of-the-art methods. In particular, the proposed method successfully finds out Trojan nets in several benchmark circuits, which are not found by the existing method.
引用
收藏
页数:4
相关论文
共 8 条
[1]  
Demrozi F, 2017, INT HIGH LEVEL DESIG, P67, DOI 10.1109/HLDVT.2017.8167465
[2]   Machine Learning for Hardware Security: Opportunities and Risks [J].
Elnaggar, Rana ;
Chakrabarty, Krishnendu .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (02) :183-201
[3]   Hardware Trojan Detection Utilizing Machine Learning Approaches [J].
Hasegawa, Kento ;
Shi, Youhua ;
Togawa, Nozomu .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1891-1896
[4]  
Hasegawa K, 2017, IEEE INT SYMP CIRC S, P2154
[5]  
Hasegawa K, 2017, IEEE INT ON LINE, P227, DOI 10.1109/IOLTS.2017.8046227
[6]  
Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
[7]  
Inoue T, 2018, IEEE I C CONS ELECT
[8]  
Kurihara T., 2020, 2020 IEEE 26 INT S O, P1