TY - GEN
T1 - Evaluation on Hardware-Trojan Detection at Gate-Level IP Cores Utilizing Machine Learning Methods
AU - Kurihara, Tatsuki
AU - Hasegawa, Kento
AU - Togawa, Nozomu
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/7
Y1 - 2020/7
N2 - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert hardware Trojans into their products, developing an effective hardware Trojan detection method is strongly required. In this paper, we evaluate hardware Trojan detection methods using neural networks and random forests at gate-level intellectual property (IP) cores that contain more than 10,000 nets. First, we extract 11 features for each net in a given netlist, and learn them with neural networks and random forests. Then, we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on the learned classifiers. The experimental results demonstrate that the average true positive rate becomes 84.6% and the average true negative rate becomes 95.1%, which is sufficiently high accuracy compared to existing evaluations.
AB - Recently, with the spread of Internet of Things (IoT) devices, embedded hardware devices have been used in a variety of everyday electrical items. Due to the increased demand for embedded hardware devices, some of the IC design and manufacturing steps have been outsourced to third-party vendors. Since malicious third-party vendors may insert hardware Trojans into their products, developing an effective hardware Trojan detection method is strongly required. In this paper, we evaluate hardware Trojan detection methods using neural networks and random forests at gate-level intellectual property (IP) cores that contain more than 10,000 nets. First, we extract 11 features for each net in a given netlist, and learn them with neural networks and random forests. Then, we classify the nets in an unknown netlist into a set of normal nets and Trojan nets based on the learned classifiers. The experimental results demonstrate that the average true positive rate becomes 84.6% and the average true negative rate becomes 95.1%, which is sufficiently high accuracy compared to existing evaluations.
KW - gate-level netlist
KW - hardware Trojan
KW - machine learning
KW - neural network
KW - random forest
UR - http://www.scopus.com/inward/record.url?scp=85091580436&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091580436&partnerID=8YFLogxK
U2 - 10.1109/IOLTS50870.2020.9159740
DO - 10.1109/IOLTS50870.2020.9159740
M3 - Conference contribution
AN - SCOPUS:85091580436
T3 - Proceedings - 2020 26th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2020
BT - Proceedings - 2020 26th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2020
Y2 - 13 July 2020 through 16 July 2020
ER -