2023
DOI: 10.1145/3579823
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Detection Using Machine Learning: A Tutorial

Abstract: With the growth and globalization of IC design and development, there is an increase in the number of Designers and Design houses. As setting up a fabrication facility may easily cost upwards of $20 billion, costs for advanced nodes may be even greater. IC design houses that cannot produce their chips in-house have no option but to use external foundries that are often in other countries. Establishing trust with these external foundries can be a challenge, and these foundries are assumed to be untrusted. The u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…Machine learning (ML) approaches have also been used extensively towards HT detection [1], [5], [18], [19] when golden models are not available. Hasegawa et al [5] proposed a random forest classifier trained on 51 circuit features extracted from Trusthub benchmarks to detect HTs.…”
Section: A Ht State-of-the-art Detectionmentioning
confidence: 99%
“…Machine learning (ML) approaches have also been used extensively towards HT detection [1], [5], [18], [19] when golden models are not available. Hasegawa et al [5] proposed a random forest classifier trained on 51 circuit features extracted from Trusthub benchmarks to detect HTs.…”
Section: A Ht State-of-the-art Detectionmentioning
confidence: 99%
“…Despite the substantial advancements in machine learning (ML)-based trojan detection techniques aiming to reduce reliance on a golden model, we opt for utilizing a reference model for trojan detection. ML-based methods are still in their early stages [25,32] and encounter difficulties in automating and ensuring accuracy, which poses risks of misclassifying trojans and allowing them to evade detection. Nonetheless, our approach remains adaptable to situations where a golden model is unavailable, relying on test generation driven by coverage of infrequent triggers to systematically uncover potential hidden malicious circuitry within the design.…”
Section: Motivationmentioning
confidence: 99%