A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features

被引:6
作者
Huang, Hao [1 ]
Shen, Haihua [1 ]
Li, Shan [1 ]
Li, Huawei [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, State Key Lab Comp Architecture, Inst Comp Technol, Beijing, Peoples R China
来源
2022 IEEE 31ST ASIAN TEST SYMPOSIUM (ATS 2022) | 2022年
关键词
hardware security; hardware Trojans; register transfer level; Trojan detection; machine learning;
D O I
10.1109/ATS56056.2022.00036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most proposed studies focus on detecting the entire hardware Trojan (HT) in one step, which is very difficult. Since the results of most proposed method have false positive, it is still necessary to check the detection results manually in real-world application. Therefore, what we need is an accurate and efficient method to locate the core part of HTs, which can assist designers to the follow-up verification and modification. In this paper, we define several RTL features based on hardware Trojan trigger control flow characteristics, and then use these features to train a decision tree-based hardware Trojan trigger localization model. The experimental results on Trust-Hub show that our method can obtain 100% true positive rate on all benchmarks and average 98.20% true negative rate. And our method can complete feature extraction and HT trigger localization within 0.1s on average.
引用
收藏
页码:138 / 143
页数:6
相关论文
共 12 条
[1]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[2]   Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection [J].
Choo, Hau Sim ;
Ooi, Chia Yee ;
Inoue, Michiko ;
Ismail, Nordinah ;
Moghbel, Mehrdad ;
Kok, Chee Hoo .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (02) :502-509
[3]  
Han T, 2019, IEEE INT SYMP CIRC S
[4]   Bacterial Foraging Optimization Algorithm with Dimension by Dimension Improvement [J].
He, Miaomiao ;
Chen, Jiajia ;
Deng, Huiwen .
2019 4TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA 2019), 2019, :1-5
[5]   TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS [J].
Karri, Ramesh ;
Rajendran, Jeyavijayan ;
Rosenfeld, Kurt ;
Tehranipoor, Mohammad .
COMPUTER, 2010, 43 (10) :39-46
[6]  
Kohavi R., 1995, IJCAI-95. Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, P1137
[7]  
Oya M, 2015, DES AUT TEST EUROPE, P465
[8]   Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models [J].
Piccolboni, Luca ;
Menon, Alessandro ;
Pravadelli, Graziano .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
[9]   COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist [J].
Salmani, Hassan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) :338-350
[10]  
Takamaeda-Yamazaki Shinya, 2015, INT S APPL REC COMP, V9040, P451, DOI 10.1007/978-3-319-16214-0_42