TY - GEN
T1 - Hardware-trojan classification based on the structure of trigger circuits utilizing random forests
AU - Kurihara, Tatsuki
AU - Togawa, Nozomu
N1 - Funding Information:
This paper was supported in part by Grant-in-Aid for Scientific Research (No. 19H04080).
Publisher Copyright:
© 2021 IEEE.
PY - 2021/6/28
Y1 - 2021/6/28
N2 - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert malicious circuits, called hardware Trojans, into their products, developing an effective hardware Trojan detection method is strongly required. In this paper, we propose 25 hardware-Trojan features based on the structure of trigger circuits for machine-learning-based hardware Trojan detection. Combining the proposed features into 11 existing hardware-Trojan features, we totally utilize 36 hardware-Trojan features for classification. Then we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on the random-forest classifier. The experimental results demonstrate that the average true positive rate (TPR) becomes 63.6% and the average true negative rate (TNR) becomes 100.0%. They improve the average TPR by 14.7 points while keeping the average TNR compared to existing state-of-the-art methods. In particular, the proposed method successfully finds out Trojan nets in several benchmark circuits, which are not found by the existing method.
AB - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert malicious circuits, called hardware Trojans, into their products, developing an effective hardware Trojan detection method is strongly required. In this paper, we propose 25 hardware-Trojan features based on the structure of trigger circuits for machine-learning-based hardware Trojan detection. Combining the proposed features into 11 existing hardware-Trojan features, we totally utilize 36 hardware-Trojan features for classification. Then we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on the random-forest classifier. The experimental results demonstrate that the average true positive rate (TPR) becomes 63.6% and the average true negative rate (TNR) becomes 100.0%. They improve the average TPR by 14.7 points while keeping the average TNR compared to existing state-of-the-art methods. In particular, the proposed method successfully finds out Trojan nets in several benchmark circuits, which are not found by the existing method.
KW - hardware Trojan
KW - hardware security
KW - machine learning
KW - netlist
KW - random forest
UR - http://www.scopus.com/inward/record.url?scp=85112049649&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85112049649&partnerID=8YFLogxK
U2 - 10.1109/IOLTS52814.2021.9486700
DO - 10.1109/IOLTS52814.2021.9486700
M3 - Conference contribution
AN - SCOPUS:85112049649
T3 - Proceedings - 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design, IOLTS 2021
BT - Proceedings - 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design, IOLTS 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 27th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2021
Y2 - 28 June 2021 through 30 June 2021
ER -