2022
DOI: 10.1109/tvlsi.2022.3191683
|View full text |Cite
|
Sign up to set email alerts
|

Golden Reference-Free Hardware Trojan Localization Using Graph Convolutional Network

Abstract: The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted thirdparty entities worldwide. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs). These HTs can compromise the integrity, deteriorate the performance, deny the service, and alter the functionality of the design. While nu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…The focal point of this section revolves around HTD utilizing the "Hardware Trojan Power & EM Side-Channel" dataset obtained from IEEE DataPort 41 . The IEEE dataset is a comprehensive collection of single-dimensional time series readings for power and EM side-channel signals, Fig.…”
Section: Methodsmentioning
confidence: 99%
“…The focal point of this section revolves around HTD utilizing the "Hardware Trojan Power & EM Side-Channel" dataset obtained from IEEE DataPort 41 . The IEEE dataset is a comprehensive collection of single-dimensional time series readings for power and EM side-channel signals, Fig.…”
Section: Methodsmentioning
confidence: 99%
“…According to the lifecycle of integrated circuits, HT detection techniques can be categorized into pre-silicon and post-silicon detection techniques. Yasaei et al [8] convert the HDL code of the circuit into a specific data flow graph in the pre-silicon stage, and then they use a graph convolutional network (GCN) to classify the nodes in the graph to determine whether they are infected by HTs, achieving HT detection and localization. Lyu and Mishra [9] map the activation problem of HT trigger logic to the maximum clique cover problem and propose a test vector generation algorithm based on maximal clique sampling to increase the probability of activating hidden HTs, thereby improving the HT detection rate.…”
Section: Introductionmentioning
confidence: 99%