Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Title | Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Bian, R., Xue, M., Wang, J. |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Date Published | aug |
ISBN Number | 978-1-5386-4388-4 |
Keywords | Clustering algorithms, clustering ensemble, existing hardware Trojan detection, fabrication, fabrication process, golden models-free hardware Trojan detection framework, Hardware, hardware security, hardware Trojan detection, IC, Integrated circuit modeling, integrated circuit testing, invasive software, novel clustering ensemble method, novel clustering ensemble technique, pattern clustering, pubcrawl, robust hardware Trojan detection framework, Testing, testing stage, trojan horse detection, Trojan horses, Trusted Computing, trusted hardware Trojan detection framework, unsupervised learning, untrustworthy testing parties, untrustworthy testing party |
Abstract | As a result of the globalization of integrated circuits (ICs) design and fabrication process, ICs are becoming vulnerable to hardware Trojans. Most of the existing hardware Trojan detection works suppose that the testing stage is trustworthy. However, testing parties may conspire with malicious attackers to modify the results of hardware Trojan detection. In this paper, we propose a trusted and robust hardware Trojan detection framework against untrustworthy testing parties exploiting a novel clustering ensemble method. The proposed technique can expose the malicious modifications on Trojan detection results introduced by untrustworthy testing parties. Compared with the state-of-the-art detection methods, the proposed technique does not require fabricated golden chips or simulated golden models. The experiment results on ISCAS89 benchmark circuits show that the proposed technique can resist modifications robustly and detect hardware Trojans with decent accuracy (up to 91%). |
URL | https://ieeexplore.ieee.org/document/8456072 |
DOI | 10.1109/TrustCom/BigDataSE.2018.00203 |
Citation Key | bian_building_2018 |
- novel clustering ensemble method
- untrustworthy testing party
- untrustworthy testing parties
- Unsupervised Learning
- trusted hardware Trojan detection framework
- Trusted Computing
- Trojan horses
- trojan horse detection
- testing stage
- testing
- robust hardware Trojan detection framework
- pubcrawl
- pattern clustering
- novel clustering ensemble technique
- Clustering algorithms
- invasive software
- integrated circuit testing
- Integrated circuit modeling
- IC
- hardware Trojan detection
- Hardware Security
- Hardware
- golden models-free hardware Trojan detection framework
- fabrication process
- fabrication
- existing hardware Trojan detection
- clustering ensemble