Abstract
A method to detect hardware Trojan in gate-level netlist is proposed using deep learning technique. The paper shows that it is easy to identify genuine nodes and Trojan-infected nodes based on controllability and transition probability values of a given Trojan-infected circuit. The controllability and transition probability characteristics of Trojan-infected nodes show large inter-cluster distance from the genuine nodes so that it is easy to cluster the nodes as Trojan-infected nodes and genuine nodes. From a given circuit, controllability and transition probability values are extracted as Trojan features using deep learning algorithm and clustering the data using k-means clustering. The technique is validated on ISCAS’85 benchmark circuits, and it does not require any golden model as reference. The proposed method can detect all Trojan-infected nodes in less than 6 s with zero false positive and zero false negative detection accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. In: IEEE Design & Test of Computers, pp. 10–25 (2010)
Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards trojan-free trusted ICs: problem analysis and detection scheme. In: Design, Automation and Test in Europe, pp. 1362–1365 (2008)
Dubeuf, J., Hely, D., Karri, R.: Run-time detection of hardware trojans: the processor protection unit. In: IEEE European Test Symposium, ETS, pp. 1–6 (2013)
Chakraborty, R.S., Pagliarini, S., Mathew, J., Sree Ranjani, R., Nirmala Devi, M.: A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans. Emerg. Topics Comput. (2017)
Banga, M., Hsiao, M.: A region based approach for the identification of hardware trojans. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 40–47 (2010)
Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(9), 1845–1853 (2014)
Tehranipoor, M.: A survey of hardware trojan taxonomy and detection. In: IEEE Design, Test of Computers (2010)
Mohankumar, N., Periasamy, R., Sivaraj, P., Thakur, A.: Hardware trojan detection-a survey. In: 4th National Conference on Recent Trends in Communication Computation and Signal Processing (RTCSP-2013), pp. 99–102 (2013)
Kamran Haider, S., Jin, C., Ahmad, M., Manikantan Shila, D.: Hardware trojan: Threats and Emerging Solutions. ePrint Arch., Tech. Rep. (2009)
Popat, J., Mehta, U.: Transition probabilistic approach for detection and diagnosis hardware trojan in combinational circuits. In: IEEE (2016)
Salmani, H.: COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12 (2017)
Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Hardware trojans classification for gate-level netlists based on machine learning. In: Proceedings of the IEEE/ACM International Conference (2016)
Hasegawa, K., Yanagisawa, M., Togawa, N.: Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: IEEE (2017)
Hasegawa, K., Yanagisawa, M., Togawa, N.: Hardware trojans classification for gate-level netlists using multi-layer neural networks. In: IEEE (2017)
LeCun, Y., Bengio, Y., Hinton, G.: Deep Learning. Macmillan Publishers Limited (2015)
Introduction to Deep Learning. http://introtodeeplearning.com
Synopsys TetraMAX. http://www.synopsys.com/Tools/Pages/default.aspx
Dive Into Python. http://diveintopython.org. O’Reilly, Associates
Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Controllability and observability. In: Proceedings of the IEEE/ACM International Conference (2016)
Bushnell, M., Agrawal, V.: Essentials of Electronic Testing. Springer, Berlin (2015)
Autoencoder. http://ufldl.stanford.edu/tutorial/unsupervised/Autoencoders/
Autoencoder. https://github.com/Rentier/keras-autoen-coder
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Reshma, K., Priyatharishini, M., Nirmala Devi, M. (2019). Hardware Trojan Detection Using Deep Learning Technique. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 898. Springer, Singapore. https://doi.org/10.1007/978-981-13-3393-4_68
Download citation
DOI: https://doi.org/10.1007/978-981-13-3393-4_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3392-7
Online ISBN: 978-981-13-3393-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)