Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Title | Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Hasegawa, K., Yanagisawa, M., Togawa, N. |
Conference Name | 2017 IEEE International Symposium on Circuits and Systems (ISCAS) |
ISBN Number | 978-1-4673-6853-7 |
Keywords | Benchmark testing, composability, cyber physical systems, F-measure, feature extraction, gate-level netlist, gate-level netlists, Hardware, hardware trojan, hardware-Trojan detection, hardware-Trojan infected nets, IC design process, integrated circuit design, integrated circuits, invasive software, learning (artificial intelligence), Logic gates, machine learning, machine-learning based hardware Trojan classifier, malicious third-party vendors, Multiplexing, normal nets, pubcrawl, Random Forest, random forest classifier, resilience, Resiliency, trojan horse detection, Trojan horses, Trojan nets, Trojan-feature extraction, TrustHUB benchmarks |
Abstract | Recently, due to the increase of outsourcing in IC design, it has been reported that malicious third-party vendors often insert hardware Trojans into their ICs. How to detect them is a strong concern in IC design process. The features of hardware-Trojan infected nets (or Trojan nets) in ICs often differ from those of normal nets. To classify all the nets in netlists designed by third-party vendors into Trojan ones and normal ones, we have to extract effective Trojan features from Trojan nets. In this paper, we first propose 51 Trojan features which describe Trojan nets from netlists. Based on the importance values obtained from the random forest classifier, we extract the best set of 11 Trojan features out of the 51 features which can effectively detect Trojan nets, maximizing the F-measures. By using the 11 Trojan features extracted, the machine-learning based hardware Trojan classifier has achieved at most 100% true positive rate as well as 100% true negative rate in several TrustHUB benchmarks and obtained the average F-measure of 74.6%, which realizes the best values among existing machine-learning-based hardware-Trojan detection methods. |
URL | https://ieeexplore.ieee.org/document/8050827/ |
DOI | 10.1109/ISCAS.2017.8050827 |
Citation Key | hasegawa_trojan-feature_2017 |
- Logic gates
- TrustHUB benchmarks
- Trojan-feature extraction
- Trojan nets
- Trojan horses
- trojan horse detection
- Resiliency
- resilience
- random forest classifier
- Random Forest
- pubcrawl
- normal nets
- Multiplexing
- malicious third-party vendors
- machine-learning based hardware Trojan classifier
- machine learning
- Benchmark testing
- learning (artificial intelligence)
- invasive software
- integrated circuits
- integrated circuit design
- IC design process
- hardware-Trojan infected nets
- hardware-Trojan detection
- hardware trojan
- Hardware
- gate-level netlists
- gate-level netlist
- feature extraction
- F-measure
- cyber physical systems
- composability