A score-based classification method for identifying Hardware-Trojans at gate-level netlists

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)

    Abstract

    Recently, digital ICs are often designed by outside vendors to reduce design costs in semiconductor industry, which may introduce severe risks that malicious attackers implement Hardware Trojans (HTs) on them. Since IC design phase generates only a single design result, an RT-level or gate-level netlist for example, we cannot assume an HT-free netlist or a Golden netlist and then it is too difficult to identify whether a generated netlist is HT-free or HT-inserted. In this paper, we propose a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist. Our proposed method does not directly detect HTs themselves in a gate-level netlist but a net included in HTs, which is called Trojan net, instead. Firstly, we observe Trojan nets from several HT-inserted benchmarks and extract several their features. Secondly, we give scores to extracted Trojan net features and sum up them for each net in benchmarks. Then we can find out a score threshold to classify HT-free and HT-inserted netlists. Based on these scores, we can successfully classify HT-free and HT-inserted netlists in all the Trust-HUB gate-level benchmarks. Experimental results demonstrate that our method successfully identify all the HT-inserted gate-level benchmarks to be 'HT-inserted' and all the HT-free gate-level benchmarks to be 'HT-free' in approximately three hours for each benchmark.

    Original languageEnglish
    Title of host publicationProceedings -Design, Automation and Test in Europe, DATE
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages465-470
    Number of pages6
    Volume2015-April
    ISBN (Print)9783981537048
    Publication statusPublished - 2015 Apr 22
    Event2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015 - Grenoble, France
    Duration: 2015 Mar 92015 Mar 13

    Other

    Other2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015
    CountryFrance
    CityGrenoble
    Period15/3/915/3/13

    Fingerprint

    Hardware
    Semiconductor materials

    Keywords

    • classification
    • gate-level netlist
    • golden-IC free
    • hardware Trojans
    • identification

    ASJC Scopus subject areas

    • Engineering(all)

    Cite this

    Oya, M., Shi, Y., Yanagisawa, M., & Togawa, N. (2015). A score-based classification method for identifying Hardware-Trojans at gate-level netlists. In Proceedings -Design, Automation and Test in Europe, DATE (Vol. 2015-April, pp. 465-470). [7092434] Institute of Electrical and Electronics Engineers Inc..

    A score-based classification method for identifying Hardware-Trojans at gate-level netlists. / Oya, Masaru; Shi, Youhua; Yanagisawa, Masao; Togawa, Nozomu.

    Proceedings -Design, Automation and Test in Europe, DATE. Vol. 2015-April Institute of Electrical and Electronics Engineers Inc., 2015. p. 465-470 7092434.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Oya, M, Shi, Y, Yanagisawa, M & Togawa, N 2015, A score-based classification method for identifying Hardware-Trojans at gate-level netlists. in Proceedings -Design, Automation and Test in Europe, DATE. vol. 2015-April, 7092434, Institute of Electrical and Electronics Engineers Inc., pp. 465-470, 2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015, Grenoble, France, 15/3/9.
    Oya M, Shi Y, Yanagisawa M, Togawa N. A score-based classification method for identifying Hardware-Trojans at gate-level netlists. In Proceedings -Design, Automation and Test in Europe, DATE. Vol. 2015-April. Institute of Electrical and Electronics Engineers Inc. 2015. p. 465-470. 7092434
    Oya, Masaru ; Shi, Youhua ; Yanagisawa, Masao ; Togawa, Nozomu. / A score-based classification method for identifying Hardware-Trojans at gate-level netlists. Proceedings -Design, Automation and Test in Europe, DATE. Vol. 2015-April Institute of Electrical and Electronics Engineers Inc., 2015. pp. 465-470
    @inproceedings{7f46c9dd0b484435acd4769ee195fc26,
    title = "A score-based classification method for identifying Hardware-Trojans at gate-level netlists",
    abstract = "Recently, digital ICs are often designed by outside vendors to reduce design costs in semiconductor industry, which may introduce severe risks that malicious attackers implement Hardware Trojans (HTs) on them. Since IC design phase generates only a single design result, an RT-level or gate-level netlist for example, we cannot assume an HT-free netlist or a Golden netlist and then it is too difficult to identify whether a generated netlist is HT-free or HT-inserted. In this paper, we propose a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist. Our proposed method does not directly detect HTs themselves in a gate-level netlist but a net included in HTs, which is called Trojan net, instead. Firstly, we observe Trojan nets from several HT-inserted benchmarks and extract several their features. Secondly, we give scores to extracted Trojan net features and sum up them for each net in benchmarks. Then we can find out a score threshold to classify HT-free and HT-inserted netlists. Based on these scores, we can successfully classify HT-free and HT-inserted netlists in all the Trust-HUB gate-level benchmarks. Experimental results demonstrate that our method successfully identify all the HT-inserted gate-level benchmarks to be 'HT-inserted' and all the HT-free gate-level benchmarks to be 'HT-free' in approximately three hours for each benchmark.",
    keywords = "classification, gate-level netlist, golden-IC free, hardware Trojans, identification",
    author = "Masaru Oya and Youhua Shi and Masao Yanagisawa and Nozomu Togawa",
    year = "2015",
    month = "4",
    day = "22",
    language = "English",
    isbn = "9783981537048",
    volume = "2015-April",
    pages = "465--470",
    booktitle = "Proceedings -Design, Automation and Test in Europe, DATE",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",

    }

    TY - GEN

    T1 - A score-based classification method for identifying Hardware-Trojans at gate-level netlists

    AU - Oya, Masaru

    AU - Shi, Youhua

    AU - Yanagisawa, Masao

    AU - Togawa, Nozomu

    PY - 2015/4/22

    Y1 - 2015/4/22

    N2 - Recently, digital ICs are often designed by outside vendors to reduce design costs in semiconductor industry, which may introduce severe risks that malicious attackers implement Hardware Trojans (HTs) on them. Since IC design phase generates only a single design result, an RT-level or gate-level netlist for example, we cannot assume an HT-free netlist or a Golden netlist and then it is too difficult to identify whether a generated netlist is HT-free or HT-inserted. In this paper, we propose a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist. Our proposed method does not directly detect HTs themselves in a gate-level netlist but a net included in HTs, which is called Trojan net, instead. Firstly, we observe Trojan nets from several HT-inserted benchmarks and extract several their features. Secondly, we give scores to extracted Trojan net features and sum up them for each net in benchmarks. Then we can find out a score threshold to classify HT-free and HT-inserted netlists. Based on these scores, we can successfully classify HT-free and HT-inserted netlists in all the Trust-HUB gate-level benchmarks. Experimental results demonstrate that our method successfully identify all the HT-inserted gate-level benchmarks to be 'HT-inserted' and all the HT-free gate-level benchmarks to be 'HT-free' in approximately three hours for each benchmark.

    AB - Recently, digital ICs are often designed by outside vendors to reduce design costs in semiconductor industry, which may introduce severe risks that malicious attackers implement Hardware Trojans (HTs) on them. Since IC design phase generates only a single design result, an RT-level or gate-level netlist for example, we cannot assume an HT-free netlist or a Golden netlist and then it is too difficult to identify whether a generated netlist is HT-free or HT-inserted. In this paper, we propose a score-based classification method for identifying HT-free or HT-inserted gate-level netlists without using a Golden netlist. Our proposed method does not directly detect HTs themselves in a gate-level netlist but a net included in HTs, which is called Trojan net, instead. Firstly, we observe Trojan nets from several HT-inserted benchmarks and extract several their features. Secondly, we give scores to extracted Trojan net features and sum up them for each net in benchmarks. Then we can find out a score threshold to classify HT-free and HT-inserted netlists. Based on these scores, we can successfully classify HT-free and HT-inserted netlists in all the Trust-HUB gate-level benchmarks. Experimental results demonstrate that our method successfully identify all the HT-inserted gate-level benchmarks to be 'HT-inserted' and all the HT-free gate-level benchmarks to be 'HT-free' in approximately three hours for each benchmark.

    KW - classification

    KW - gate-level netlist

    KW - golden-IC free

    KW - hardware Trojans

    KW - identification

    UR - http://www.scopus.com/inward/record.url?scp=84945941793&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84945941793&partnerID=8YFLogxK

    M3 - Conference contribution

    AN - SCOPUS:84945941793

    SN - 9783981537048

    VL - 2015-April

    SP - 465

    EP - 470

    BT - Proceedings -Design, Automation and Test in Europe, DATE

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -