SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier | springerprofessional.de Skip to main content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Journal of Electronic Testing 4/2021

24.08.2021

SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier

verfasst von: Mahshid Tebyanian, Azadeh Mokhtarpour, Alireza Shafieinejad

Erschienen in: Journal of Electronic Testing | Ausgabe 4/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Weitere Produktempfehlungen anzeigen
Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283–1295 CrossRef Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283–1295 CrossRef
2.
Zurück zum Zitat Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229–1247 CrossRef Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229–1247 CrossRef
3.
Zurück zum Zitat Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express
4.
Zurück zum Zitat Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S (2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S (2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust
5.
Zurück zum Zitat Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security
6.
Zurück zum Zitat Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161 CrossRef Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161 CrossRef
7.
Zurück zum Zitat Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537–2546 CrossRef Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537–2546 CrossRef
8.
Zurück zum Zitat Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350 CrossRef Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350 CrossRef
9.
Zurück zum Zitat Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express . vol. 14, no. 18 Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express . vol. 14, no. 18
10.
Zurück zum Zitat Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17 Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17
11.
Zurück zum Zitat Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. in 17th Design Automation Conference Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. in 17th Design Automation Conference
12.
Zurück zum Zitat Dharmadhikari P, Raju A, Vemuri R (2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI) Dharmadhikari P, Raju A, Vemuri R (2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
13.
Zurück zum Zitat Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M (2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS) Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M (2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS)
14.
Zurück zum Zitat Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS) Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS)
15.
Zurück zum Zitat Bian R, Xue M, Wang J (2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security Bian R, Xue M, Wang J (2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security
16.
Zurück zum Zitat Wang Y, Han T, Han X, Liu P (2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS) Wang Y, Han T, Han X, Liu P (2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS)
17.
Zurück zum Zitat Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632–44644 CrossRef Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632–44644 CrossRef
18.
Zurück zum Zitat Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS) Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)
19.
Zurück zum Zitat Cruz J, Farahmandi F, Ahmed A Mishra P (2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID) Cruz J, Farahmandi F, Ahmed A Mishra P (2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID)
20.
Zurück zum Zitat Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC)
24.
Zurück zum Zitat Olson DL, Delen D (2008) Advanced Data Mining Techniques, 1st edition ed., Springer, p. 138 Olson DL, Delen D (2008) Advanced Data Mining Techniques, 1st edition ed., Springer, p. 138
Metadaten
Titel
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
verfasst von
Mahshid Tebyanian
Azadeh Mokhtarpour
Alireza Shafieinejad
Publikationsdatum
24.08.2021
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 4/2021
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-021-05960-2

Weitere Artikel der Ausgabe 4/2021

Journal of Electronic Testing 4/2021 Zur Ausgabe