Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction
نویسندگان
چکیده
With the globalization of semiconductor industry, hardware Trojans (HTs) are an emergent security threat in modern integrated circuit (IC) production. Research is now being conducted into designing more accurate and efficient methods to detect HTs. Recently, a number machine learning (ML)-based HT detection approaches have been proposed; however, most them still use knowledge-driven design features often engineering intuition carefully craft model improve accuracy. Therefore, this work, we propose data-driven system based on gate-level netlists. The consists four main parts: 1) Information extraction from netlist block; 2) Natural language processing (NLP) for translating information; 3) Deel (DL)-based model; 4) component final voter. In experiments, both long short-term memory networks (LSTM) convolutional neural network (CNN) used as our models. We performed experiments benchmarks Trust-hub K-fold crossing verification has applied evaluate different parameter settings training procedure. experimental results show that proposed can achieve 79.29% TPR, 99.97% TNR, 87.75% PPV 99.94% NPV combinational Trojan 93.46% 99.99% 98.92% 99.92% sequential after voting-based optimization using LEDA library-based ( logic_level =4, upsampling, LSTM, 5 epochs).
منابع مشابه
Deep Learning for Character-Based Information Extraction
In this paper we introduce a deep neural network architecture to perform information extraction on character-based sequences, e.g. named-entity recognition on Chinese text or secondary-structure detection on protein sequences. With a task-independent architecture, the deep network relies only on simple character-based features, which obviates the need for task-specific feature engineering. The ...
متن کاملExtraction of intrinsic structure for Hardware Trojan detection
In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid. . . ) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modi...
متن کاملFeature extraction strategies in deep learning based acoustic event detection
Non-speech acoustic events are significantly different between them, and usually require access to detail rich features. That is why directly modeling a real spectrogram can provide a significant advantage, instead of using predefined features that usually compress and downsample detail as typically done in speech recognition. This paper focuses on the importance of feature extraction for deep ...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملA Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing
سال: 2022
ISSN: ['2168-6750', '2376-4562']
DOI: https://doi.org/10.1109/tetc.2021.3116484