Building Trusted Golden Models-free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using A Novel Clustering Ensemble Technique

被引:6
作者
Bian, Rongzhen [1 ]
Xue, Mingfu [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
基金
中国国家自然科学基金;
关键词
hardware security; hardware Trojan detection; untrustworthy testing party; unsupervised learning; clustering ensemble;
D O I
10.1109/TrustCom/BigDataSE.2018.00203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a result of the globalization of integrated circuits (ICs) design and fabrication process, ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works suppose that the testing stage is trustworthy. However, testing parties may conspire with malicious attackers to modify the results of hardware Trojan detection. In this paper, we propose a trusted and robust hardware Trojan detection framework against untrustworthy testing parties exploiting a novel clustering ensemble method. The proposed technique can expose the malicious modifications on Trojan detection results introduced by untrustworthy testing parties. Compared with the state-of-the-art detection methods, the proposed technique does not require fabricated golden chips or simulated golden models. The experiment results on ISCAS89 benchmark circuits show that the proposed technique can resist modifications robustly and detect hardware Trojans with decent accuracy (up to 91%).
引用
收藏
页码:1458 / 1463
页数:6
相关论文
共 22 条
  • [1] [Anonymous], T COMPUT AIDED DESIG
  • [2] [Anonymous], 4 INT C CLOUD COMP S
  • [3] Ba P. S., 2016, IEEE INT VERIFICATIO, P1
  • [4] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [5] Çakir B, 2015, DES AUT TEST EUROPE, P471
  • [6] Hardware Trojan: Threats and Emerging Solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    [J]. 2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
  • [7] Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
  • [8] Data clustering: A review
    Jain, AK
    Murty, MN
    Flynn, PJ
    [J]. ACM COMPUTING SURVEYS, 1999, 31 (03) : 264 - 323
  • [9] BOOTSTRAP TECHNIQUE IN CLUSTER-ANALYSIS
    JAIN, AK
    MOREAU, JV
    [J]. PATTERN RECOGNITION, 1987, 20 (05) : 547 - 568
  • [10] Kulkarni A, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P120, DOI 10.1109/HST.2016.7495568