TY - JOUR
T1 - Hardware-Trojan Detection Based on the Structural Features of Trojan Circuits Using Random Forests
AU - Kurihara, Tatsuki
AU - Togawa, Nozomu
N1 - Funding Information:
This paper was supported in part by Grant-in-Aid for Scientific Research (No. 19H04080).
Publisher Copyright:
Copyright © 2022 The Institute of Electronics, Information and Communication Engineers.
PY - 2022/7
Y1 - 2022/7
N2 - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert malicious circuits, called hardware Trojans, into their products, developing an effective hardware-Trojan detection method is strongly required. In this paper, we propose 25 hardware-Trojan features focusing on the structure of trigger circuits for machine-learning-based hardware-Trojan detection. Combining the proposed features into 11 existing hardware-Trojan features, we totally utilize 36 hardware-Trojan features for classification. Then we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on a random-forest classifier. The experimental results demonstrate that the average true positive rate (TPR) becomes 64.2% and the average true negative rate (TNR) becomes 100.0%. They improve the average TPR by 14.8 points while keeping the average TNR compared to existing state-of-the-art methods. In particular, the proposed method successfully finds out Trojan nets in several benchmark circuits, which are not found by the existing method.
AB - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert malicious circuits, called hardware Trojans, into their products, developing an effective hardware-Trojan detection method is strongly required. In this paper, we propose 25 hardware-Trojan features focusing on the structure of trigger circuits for machine-learning-based hardware-Trojan detection. Combining the proposed features into 11 existing hardware-Trojan features, we totally utilize 36 hardware-Trojan features for classification. Then we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on a random-forest classifier. The experimental results demonstrate that the average true positive rate (TPR) becomes 64.2% and the average true negative rate (TNR) becomes 100.0%. They improve the average TPR by 14.8 points while keeping the average TNR compared to existing state-of-the-art methods. In particular, the proposed method successfully finds out Trojan nets in several benchmark circuits, which are not found by the existing method.
KW - gate-level netlist
KW - hardware Trojan
KW - machine learning
KW - random forest
KW - trigger circuit
UR - http://www.scopus.com/inward/record.url?scp=85137616813&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85137616813&partnerID=8YFLogxK
U2 - 10.1587/transfun.2021EAP1091
DO - 10.1587/transfun.2021EAP1091
M3 - Article
AN - SCOPUS:85137616813
SN - 0916-8508
VL - E105A
SP - 1049
EP - 1060
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 7
ER -