2022
DOI: 10.1142/s0218126622501353
|View full text |Cite
|
Sign up to set email alerts
|

A Hardware Trojan Detection and Diagnosis Method for Gate-Level Netlists Based on Different Machine Learning Algorithms

Abstract: The design complexity and outsourcing trend of modern integrated circuits (ICs) have increased the chance for adversaries to implant hardware Trojans (HTs) in the development process. To effectively defend against this hardware-based security threat, many solutions have been reported in the literature, including dynamic and static techniques. However, there is still a lack of methods that can simultaneously detect and diagnose HT circuits with high accuracy and low time complexity. Therefore, to overcome these… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…They partitioned the circuit into multiple cones and extracted the HT feature values of that method, and they then diagnosed the location of the HT circuits. Huang et al [28] presented an HT detection and diagnosis method for GLNs based on different ML models. They classified all the circuit cones of the target GLN using different ML models; they then determined whether each circuit cone was HT-implanted through the label.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They partitioned the circuit into multiple cones and extracted the HT feature values of that method, and they then diagnosed the location of the HT circuits. Huang et al [28] presented an HT detection and diagnosis method for GLNs based on different ML models. They classified all the circuit cones of the target GLN using different ML models; they then determined whether each circuit cone was HT-implanted through the label.…”
Section: Related Workmentioning
confidence: 99%
“…For another comparative experiment, we chose [28], which implemented GLHT detection using ML with different models and achieved good results. Table 12 shows the comparative detection results; it is evident that, although the TNR in this article was lower compared to [28], the F1 score generally tended to be higher than that of [28].…”
Section: Netlistmentioning
confidence: 99%
See 1 more Smart Citation
“…It used feature importance function to choose 49 optimal features, but class imbalance problem had not been dealt with. An effort to combine structural features based HTD with circuit partitioning schemes for Trojan localization, was attempted in [41], [42]. An unsupervised HTD approach termed PL-HTD, where principal component analysis generates an optimal feature set for unsupervised classification using a local outlier factor algorithm had been attempted [43].…”
Section: Related Workmentioning
confidence: 99%
“…The dynamic detection method is designed to detect HT circuits inserted by untrusted foundries during the manufacturing process [4][5][6][7][8][9]. The static detection methods use testability-based structural features extracted from IC design files to match HTs' features [10][11][12][13][14]. However, since attackers may create special types/hard-to-activate HTs, there is no complete guarantee that HT circuits can be identified during the detection phase.…”
Section: Introductionmentioning
confidence: 99%