Skip to main content

Abstract

As the internationalization of Integrated Circuit (IC) production increased, the inclusion of deliberately stealthy modification called hardware Trojans has also escalated. A hardware Trojan detection method that works at the gate-level using the netlist of the circuit under test is presented in this paper. The unsupervised machine learning algorithm, K-Means classification is used for categorization. Every net of the circuit is analyzed to determine if the net is genuine or is Trojan infected by the extraction of seven relevant features from every net. The technique has been validated on ISCAS’85 benchmark circuits and parameters like true positive (TP), false negative (FN) and recall (TPR) have been illustrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhang J, Yuan F, Xu Q (2014) DeTrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 153–166

    Google Scholar 

  2. Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the ACM conference on computer and communications security, pp 697–708. https://doi.org/10.1145/2508859.2516654

  3. Moein S, Gulliver TA, Gebali F, Alkandari A (2016) A new characterization of hardware trojans. IEEE Access 4:2721–2731

    Article  Google Scholar 

  4. Moein S, Khan S, Gulliver TA, Gebali F, El-Kharashi MW (2015) An attribute based classification of hardware trojans. In: 2015 tenth international conference on computer engineering & systems (ICCES), Cairo, pp 351–356

    Google Scholar 

  5. Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st international conference on computer design (ICCD), Asheville, NC, pp 471–474

    Google Scholar 

  6. Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: 2015 design automation & test in Europe conference & exhibition (DATE), pp 465–470

    Google Scholar 

  7. Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) VeriTrust: verification for hardware trust. IEEE Trans Comput Aided Des Integr Circ Syst 34(7):1148–1161

    Article  Google Scholar 

  8. Hasegawa K, Yanagisawa M, Togawa N (2017) A hardware-trojan classification method using machine learning at gate-level netlists based on trojan features. IEICE Trans Fundam Electron Commun Comput Sci E100.A(7):1427–1438

    Google Scholar 

  9. Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. IEEE Comput 43(10):39–46

    Google Scholar 

  10. Suresh Babu N, Mohankumar N (2019) Wire load variation-based hardware trojan detection using machine learning techniques. In: Soft computing and signal processing. Advances in intelligent systems and computing, vol 900. Springer, Singapore

    Google Scholar 

  11. Bao C, Forte D, Srivastava A (2016) On reverse engineering-based hardware trojan detection. IEEE Trans Comput Aided Des Integr Circuits Syst 35(1):49–57

    Article  Google Scholar 

  12. Inoue T, Hasegawa K, Kobayashi Y, Yanagisawa M, Togawa N (2018) Designing subspecies of hardware trojans and their detection using neural network approach. In: Proceedings of IEEE 8th international conference on consumer electronics—Berlin (ICCE-Berlin)

    Google Scholar 

  13. Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware trojans classification for gate-level netlists using multi-layer neural networks. In Proceedings of IEEE 23rd international symposium on on-line testing and robust system design (IOLTS), pp 227–232

    Google Scholar 

  14. Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: Proceedings of international symposium on circuits and systems

    Google Scholar 

  15. Inoue T, Hasegawa K, Yanagisawa M, Togawa N (2017) Designing hardware trojans and their detection based ON a SVM-based approach. In: Proceedings of international conference on ASIC (ASICON), pp 811–814

    Google Scholar 

  16. Zantout S (2018) Hardware trojan detection in FPGA through side-channel power analysis and machine learning. UC Irvine. ProQuest ID: Zantout_uci_0030M_14966. Merritt ID: ark:/13030/m5k40r5c. Retrieved from https://escholarship.org/uc/item/7hk8x6rb

  17. Brglez F, Fujiwara H (1985) A neutral netlist of 10 combinational benchmark circuits. In: Proceedings of IEEE international symposium on circuits and systems, IEEE Press, Piscataway, N.J., pp 695–698; see also the ISCAS-85 benchmark directory at http://www.cbl.ncsu.edu/benchmarks

    Google Scholar 

  18. Reshma K, Priyatharishini M, Nirmala Devi M (2019) Hardware trojan detection using deep learning technique. In: Computing and signal processing. advances in intelligent systems and computing, vol 898. Springer, Singapore

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. K. Swetha Kayal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chockaiah, N.S., Kayal, S.K.S., Malar, J.K., Kirithika, P., Devi, M.N. (2021). Hardware Trojan Detection Using Machine Learning Technique. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_37

Download citation

Publish with us

Policies and ethics