Trojan-net classification for gate-level hardware design utilizing boundary net structures

Research output: Contribution to journalArticle

Abstract

Cybersecurity has become a serious concern in our daily lives. The malicious functions inserted into hardware devices have been well known as hardware Trojans. In this letter, we propose a hardware-Trojan classification method at gate-level netlists utilizing boundary net structures. We first use a machine-learning-based hardware-Trojan detection method and classify the nets in a given netlist into a set of normal nets and a set of Trojan nets. Based on the classification results, we investigate the net structures around the boundary between normal nets and Trojan nets, and extract the features of the nets mistakenly identified to be normal nets or Trojan nets. Finally, based on the extracted features of the boundary nets, we again classify the nets in a given netlist into a set of normal nets and a set of Trojan nets. The experimental results demonstrate that our proposed method outperforms an existing machine-learning-based hardware-Trojan detection method in terms of its true positive rate.

Original languageEnglish
Pages (from-to)1618-1622
Number of pages5
JournalIEICE Transactions on Information and Systems
VolumeE103D
Issue number7
DOIs
Publication statusPublished - 2020 Jul 1

Keywords

  • Boundary nets
  • Gate-level netlist
  • Hardware design
  • Hardware trojan
  • Trojan feature

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint Dive into the research topics of 'Trojan-net classification for gate-level hardware design utilizing boundary net structures'. Together they form a unique fingerprint.

  • Cite this