A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features

被引:33
作者
Hasegawa, Kento [1 ]
Yanagisawa, Masao [1 ]
Togawa, Nozomu [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Commun Engn, Tokyo 1698555, Japan
关键词
hardware Trojan; gate-level netlist; machine learning; support vector machine (SVM); neural network (NN);
D O I
10.1587/transfun.E100.A.1427
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the increase of outsourcing by IC vendors, we face a serious risk that malicious third-party vendors insert hardware Trojans very easily into their IC products. However, detecting hardware Trojans is very difficult because today's ICs are huge and complex. In this paper, we propose a hardware-Trojan classification method for gate-level netlists to identify hardware-Trojan infected nets (or Trojan nets) using a support vector machine (SVM) or a neural network (NN). At first, we extract the five hardware-Trojan features from each net in a netlist. These feature values are complicated so that we cannot give the simple and fixed threshold values to them. Hence we secondly represent them to be a five-dimensional vector and learn them by using SVM or NN. Finally, we can successfully classify all the nets in an unknown netlist into Trojan ones and normal ones based on the learned classifiers. We have applied our machine-learning based hardware-Trojan classification method to Trust-HUB benchmarks. The results demonstrate that our method increases the true positive rate compared to the existing state-of-the-art results in most of the cases. In some cases, our method can achieve the true positive rate of 100%, which shows that all the Trojan nets in an unknown netlist are completely detected by our method.
引用
收藏
页码:1427 / 1438
页数:12
相关论文
共 20 条
  • [1] Çakir B, 2015, DES AUT TEST EUROPE, P471
  • [2] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [3] Logistic regression and artificial neural network classification models: a methodology review
    Dreiseitl, S
    Ohno-Machado, L
    [J]. JOURNAL OF BIOMEDICAL INFORMATICS, 2002, 35 (5-6) : 352 - 359
  • [4] Francq J, 2015, DES AUT TEST EUROPE, P770
  • [5] Goutte C, 2005, LECT NOTES COMPUT SC, V3408, P345
  • [6] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [7] Hsu C.W., 2003, PRACTICAL GUIDE SUPP
  • [8] Iwase T, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P185, DOI 10.1109/GCCE.2015.7398569
  • [9] Kohavi R., 1995, Proceedings of the 14th International Joint Conference on Artificial Intelligence, V2, P1137
  • [10] Kulkarni A, 2016, INT SYM QUAL ELECT, P362, DOI 10.1109/ISQED.2016.7479228