A Locating Method for Multi-Purposes HTs Based on the Boundary Network

被引:17
作者
Dong, Chen [1 ,2 ,3 ]
Zhang, Fan [1 ,2 ]
Liu, Ximeng [1 ,2 ]
Huang, Xing [1 ,4 ]
Guo, Wenzhong [1 ,3 ]
Yang, Yang [1 ,2 ]
机构
[1] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Spatial Data Min & Informat Sharing, Minist Educ, Fuzhou 350116, Fujian, Peoples R China
[2] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[3] Fuzhou Univ, Fujian Prov Key Lab Network Comp & Intelligent In, Fuzhou 350116, Fujian, Peoples R China
[4] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
基金
中国国家自然科学基金;
关键词
Hardware trojan; Integrated circuit; boundary network; static detection; ML-HTCL; HARDWARE TROJAN DETECTION; DEFENSE;
D O I
10.1109/ACCESS.2019.2932478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there are various methods for detecting the hardware trojans (HTs) in the integrated circuits (ICs). The circuit's logic representations of different types, structures, and functional characteristics should be different. Each type of circuit has its' own performance characteristics according to its' purpose. However, the traditional HTs detection methods adopt the same approach to deal with the multi-purpose hardware trojan. At the same time, as the scale of integrated circuits growing, the structures are more complex, and the functions are more refined. The current situation makes the traditional HTs detection methods weaker and even unfeasible. Therefore, we propose an HTs classified locating method based on machine learning, named ML-HTCL, which belongs to the static detection and locating method. In ML-HTCL, different purpose HTs were represented by different features. Due to the different features, the ML-HTCL employs the multi-layer BP neural network for the control signal type HTs and the one-class SVM for the information leakage HTs, respectively. To deal with the HTs completely, the boundary nets are considered for all data set, while those were ignored by the most existing methods due to the high detection error rate. After detection, the HTs' precise locations were achieved. To evaluate the ML-HTCL, 17 gate-level netlist benchmarks are used for training and testing by leave-one-out cross-validation. From the results, the ML-HTCL reaches 85.05% of TPR and 73.91% of TNR for all kinds of HTs, which performs better than the most existing methods.
引用
收藏
页码:110936 / 110950
页数:15
相关论文
共 34 条
  • [1] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [2] A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement
    Amelian, Atieh
    Borujeni, Shahram Etemadi
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (09)
  • [3] [Anonymous], 2018, Journal of Hardware and Systems Security
  • [4] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [5] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [6] A tutorial on Support Vector Machines for pattern recognition
    Burges, CJC
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) : 121 - 167
  • [7] Hardware Trojan: Threats and Emerging Solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    [J]. 2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
  • [8] A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms
    Chen, Xiaoming
    Wang, Lin
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (10) : 1633 - 1646
  • [9] Chi G., 2017, SEMICOND TECHNOL
  • [10] Cozzi M., 2018, P INT WORKSH CONSTR