Hardware-Trojan Detection at Gate-level Netlists using a Gradient Boosting Decision Tree Model and its Extension using Trojan Probability Propagation
نویسندگان
چکیده
Technological devices have become deeply embedded in people's lives, and their demand is growing every year. It has been indicated that outsourcing the design manufacturing of integrated circuits, which are essential for technological devices, may lead to insertion malicious circuitry, called hardware Trojans (HTs). This paper proposes an HT detection method at gate-level netlists based on XGBoost, one best gradient boosting decision tree models. We first propose optimal set features among many feature candidates a netlist level through thorough evaluations. Then, we construct XGBoost-based with its optimized hyperparameters. Evaluation experiments were conducted from Trust-HUB benchmarks showed average F-measure 0.842 using proposed method. Also, newly Trojan probability propagation effectively corrects results apply it obtained by detection. improved 0.861. value 0.194 points higher than existing so far.
منابع مشابه
System-level protection and hardware Trojan detection using weighted voting☆
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملA Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملHardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis
A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...
متن کاملHardware Trojan vulnerability
Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2023
ISSN: ['1745-1337', '0916-8508']
DOI: https://doi.org/10.1587/transfun.2023kep0005