2021
DOI: 10.26599/tst.2019.9010047
|View full text |Cite
|
Sign up to set email alerts
|

HTDet: A clustering method using information entropy for hardware Trojan detection

Abstract: Hardware Trojans (HTs) have drawn increasing attention in both academia and industry because of their significant potential threat. In this paper, we propose HTDet, a novel HT detection method using information entropybased clustering. To maintain high concealment, HTs are usually inserted in the regions with low controllability and low observability, which will result in that Trojan logics have extremely low transitions during the simulation. This implies that the regions with the low transitions will provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 32 publications
0
20
0
Order By: Relevance
“…Since it is based on heuristic of using statistical model to estimate the signal correlations of gate-level netlist, it neither need the circuit to be brought to the triggering state, nor the effect of the Trojan payload to be propagated and observed at the output. This idea was inherited in [82], where the authors directly apply the transition probability as the feature for analysis. To address the order sensitivity problem, a stacked long short-term memory network is designed to build a robust HT detection model.…”
Section: Ml-based Heuristic Analysis For Detection Of Vulnerabilitiesmentioning
confidence: 99%
“…Since it is based on heuristic of using statistical model to estimate the signal correlations of gate-level netlist, it neither need the circuit to be brought to the triggering state, nor the effect of the Trojan payload to be propagated and observed at the output. This idea was inherited in [82], where the authors directly apply the transition probability as the feature for analysis. To address the order sensitivity problem, a stacked long short-term memory network is designed to build a robust HT detection model.…”
Section: Ml-based Heuristic Analysis For Detection Of Vulnerabilitiesmentioning
confidence: 99%
“…Another referencefree HT detection scheme utilizing testability measures was developed in [30]. Further, information theory-based HT detection approach investigating the relation between transition probability and the information available on a net for unsupervised Trojan detection using density-based clustering algorithm was attempted in [31]. Transition probability and testability measures were further explored in [32] and [33].Limited representative training data resulted in low TPR.…”
Section: Related Workmentioning
confidence: 99%
“…• Sensors: The sensors' data can be used via the adversary penetration in the control platform. This penetration is simply accomplished via Trojan Horse [159] in which the remote systems are employed as hosts. From the acquisition panel, the sensor output is usually within 15 V. For calibrating it alongside the real measurement, acquisition gains using a linear plotting system is utilized.…”
Section: B Vulnerability Analysis Of Cyber-attacks On the Control Ofmentioning
confidence: 99%