Skip to main content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Journal of Electronic Testing 4/2021

24-08-2021

SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier

Authors: Mahshid Tebyanian, Azadeh Mokhtarpour, Alireza Shafieinejad

Published in: Journal of Electronic Testing | Issue 4/2021

Log in

Abstract

Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Appendix
Available only for authorised users
Literature
1.
go back to reference Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283–1295 CrossRef Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283–1295 CrossRef
2.
go back to reference Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229–1247 CrossRef Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229–1247 CrossRef
3.
go back to reference Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express
4.
go back to reference Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S (2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S (2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust
5.
go back to reference Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security
6.
go back to reference Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161 CrossRef Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161 CrossRef
7.
go back to reference Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537–2546 CrossRef Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537–2546 CrossRef
8.
go back to reference Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350 CrossRef Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350 CrossRef
9.
go back to reference Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express . vol. 14, no. 18 Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express . vol. 14, no. 18
10.
go back to reference Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17 Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17
11.
go back to reference Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. in 17th Design Automation Conference Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. in 17th Design Automation Conference
12.
go back to reference Dharmadhikari P, Raju A, Vemuri R (2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI) Dharmadhikari P, Raju A, Vemuri R (2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
13.
go back to reference Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M (2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS) Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M (2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS)
14.
go back to reference Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS) Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS)
15.
go back to reference Bian R, Xue M, Wang J (2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security Bian R, Xue M, Wang J (2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security
16.
go back to reference Wang Y, Han T, Han X, Liu P (2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS) Wang Y, Han T, Han X, Liu P (2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS)
17.
go back to reference Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632–44644 CrossRef Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632–44644 CrossRef
18.
go back to reference Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS) Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)
19.
go back to reference Cruz J, Farahmandi F, Ahmed A Mishra P (2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID) Cruz J, Farahmandi F, Ahmed A Mishra P (2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID)
20.
go back to reference Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC)
24.
go back to reference Olson DL, Delen D (2008) Advanced Data Mining Techniques, 1st edition ed., Springer, p. 138 Olson DL, Delen D (2008) Advanced Data Mining Techniques, 1st edition ed., Springer, p. 138
Metadata
Title
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
Authors
Mahshid Tebyanian
Azadeh Mokhtarpour
Alireza Shafieinejad
Publication date
24-08-2021
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 4/2021
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-021-05960-2

Other articles of this Issue 4/2021

Journal of Electronic Testing 4/2021 Go to the issue