Abstract
As the internationalization of Integrated Circuit (IC) production increased, the inclusion of deliberately stealthy modification called hardware Trojans has also escalated. A hardware Trojan detection method that works at the gate-level using the netlist of the circuit under test is presented in this paper. The unsupervised machine learning algorithm, K-Means classification is used for categorization. Every net of the circuit is analyzed to determine if the net is genuine or is Trojan infected by the extraction of seven relevant features from every net. The technique has been validated on ISCAS’85 benchmark circuits and parameters like true positive (TP), false negative (FN) and recall (TPR) have been illustrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang J, Yuan F, Xu Q (2014) DeTrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 153–166
Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the ACM conference on computer and communications security, pp 697–708. https://doi.org/10.1145/2508859.2516654
Moein S, Gulliver TA, Gebali F, Alkandari A (2016) A new characterization of hardware trojans. IEEE Access 4:2721–2731
Moein S, Khan S, Gulliver TA, Gebali F, El-Kharashi MW (2015) An attribute based classification of hardware trojans. In: 2015 tenth international conference on computer engineering & systems (ICCES), Cairo, pp 351–356
Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st international conference on computer design (ICCD), Asheville, NC, pp 471–474
Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: 2015 design automation & test in Europe conference & exhibition (DATE), pp 465–470
Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) VeriTrust: verification for hardware trust. IEEE Trans Comput Aided Des Integr Circ Syst 34(7):1148–1161
Hasegawa K, Yanagisawa M, Togawa N (2017) A hardware-trojan classification method using machine learning at gate-level netlists based on trojan features. IEICE Trans Fundam Electron Commun Comput Sci E100.A(7):1427–1438
Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. IEEE Comput 43(10):39–46
Suresh Babu N, Mohankumar N (2019) Wire load variation-based hardware trojan detection using machine learning techniques. In: Soft computing and signal processing. Advances in intelligent systems and computing, vol 900. Springer, Singapore
Bao C, Forte D, Srivastava A (2016) On reverse engineering-based hardware trojan detection. IEEE Trans Comput Aided Des Integr Circuits Syst 35(1):49–57
Inoue T, Hasegawa K, Kobayashi Y, Yanagisawa M, Togawa N (2018) Designing subspecies of hardware trojans and their detection using neural network approach. In: Proceedings of IEEE 8th international conference on consumer electronics—Berlin (ICCE-Berlin)
Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware trojans classification for gate-level netlists using multi-layer neural networks. In Proceedings of IEEE 23rd international symposium on on-line testing and robust system design (IOLTS), pp 227–232
Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: Proceedings of international symposium on circuits and systems
Inoue T, Hasegawa K, Yanagisawa M, Togawa N (2017) Designing hardware trojans and their detection based ON a SVM-based approach. In: Proceedings of international conference on ASIC (ASICON), pp 811–814
Zantout S (2018) Hardware trojan detection in FPGA through side-channel power analysis and machine learning. UC Irvine. ProQuest ID: Zantout_uci_0030M_14966. Merritt ID: ark:/13030/m5k40r5c. Retrieved from https://escholarship.org/uc/item/7hk8x6rb
Brglez F, Fujiwara H (1985) A neutral netlist of 10 combinational benchmark circuits. In: Proceedings of IEEE international symposium on circuits and systems, IEEE Press, Piscataway, N.J., pp 695–698; see also the ISCAS-85 benchmark directory at http://www.cbl.ncsu.edu/benchmarks
Reshma K, Priyatharishini M, Nirmala Devi M (2019) Hardware trojan detection using deep learning technique. In: Computing and signal processing. advances in intelligent systems and computing, vol 898. Springer, Singapore
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chockaiah, N.S., Kayal, S.K.S., Malar, J.K., Kirithika, P., Devi, M.N. (2021). Hardware Trojan Detection Using Machine Learning Technique. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_37
Download citation
DOI: https://doi.org/10.1007/978-981-15-7234-0_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7233-3
Online ISBN: 978-981-15-7234-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)