Advanced Search
Volume 43 Issue 10
Oct.  2021
Turn off MathJax
Article Contents
Ying ZHANG, Shen LI, Xin CHEN, Jiaqi YAO, Zhiming MAO. Hybrid Multi-level Hardware Trojan Detection Method for Gate-level Netlists Based on XGBoost[J]. Journal of Electronics & Information Technology, 2021, 43(10): 3050-3057. doi: 10.11999/JEIT200874
Citation: Ying ZHANG, Shen LI, Xin CHEN, Jiaqi YAO, Zhiming MAO. Hybrid Multi-level Hardware Trojan Detection Method for Gate-level Netlists Based on XGBoost[J]. Journal of Electronics & Information Technology, 2021, 43(10): 3050-3057. doi: 10.11999/JEIT200874

Hybrid Multi-level Hardware Trojan Detection Method for Gate-level Netlists Based on XGBoost

doi: 10.11999/JEIT200874
Funds:  The National Natural Science Foundation of China (61701228, 61106029), The Science and Technology on Analog Integrated Circuit Laboratory (61428020304), The AeronauticalScience Foundation of China (20180852005)
  • Received Date: 2020-10-12
  • Rev Recd Date: 2021-07-20
  • Available Online: 2021-07-30
  • Publish Date: 2021-10-18
  • A hybrid multi-level hardware Trojan detection method based on XGBoost algorithm is proposed for the problem of hardware Trojans implanted by malicious third-party manufacturers. The detection method treats each wire in gate-level netlist as a node and detects Trojans in three levels. Firstly, the effective static features of the circuit are extracted and the XGBoost algorithm is applied to detect the suspicious Trojan circuits. Common circuits distinguished at the first level continued to be detected at the second level by analyzing scan chain structural features. Finally, dynamic detection is used to increase further the accuracy of Trojans detection. Experimental results on Trust-hub benchmark show that this method has a higher accuracy compared with other existing detection methods. This detection method can finally achieve 94.0% average True Positive Rate (TPR) and 99.3% average True Negative Rate (TNR).
  • loading
  • [1]
    ELNAGGAR R, CHAKRABARTY K, and TAHOORI M B. Hardware Trojan detection using changepoint-based anomaly detection techniques[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019, 27(12): 2706–2719. doi: 10.1109/TVLSI.2019.2925807
    [2]
    CHEN Jinghui, DONG Chen, ZHANG Fan, et al. A Hardware-Trojans detection approach based on eXtreme Gradient Boosting[C]. 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), Beijing, China, 2019: 69–73.
    [3]
    张毅军, 张晓, 林少锋, 等. 基于功耗特征的硬件木马检测方法[J]. 电脑知识与技术, 2019, 15(31): 15–16, 26.

    ZHANG Yijun, ZHANG Xiao, LIN Shaofeng, et al. Hardware Trojan detection method based on power consumption features[J]. Computer Knowledge and Technology, 2019, 15(31): 15–16, 26.
    [4]
    SAAD W, SANJAB A, WANG Yunpeng, et al. Hardware Trojan detection game: A prospect-theoretic approach[J]. IEEE Transactions on Vehicular Technology, 2017, 66(9): 7697–7710. doi: 10.1109/TVT.2017.2686853
    [5]
    佟鑫, 李莹, 陈岚. SVM算法在硬件木马旁路分析检测中的应用[J]. 电子与信息学报, 2020, 42(7): 1643–1651. doi: 10.11999/JEIT190532

    TONG Xin, LI Ying, and CHEN Lan. Application of SVM machine learning to hardware Trojan detection using side-channel analysis[J]. Journal of Electronics &Information Technology, 2020, 42(7): 1643–1651. doi: 10.11999/JEIT190532
    [6]
    王晓晗, 王韬, 李雄伟, 等. 基于人工蜂群的硬件木马测试向量生成方法[J]. 上海交通大学学报, 2019, 53(10): 1218–1224.

    WANG Xiaohan, WANG Tao, LI Xiongwei, et al. Test pattern generation method for hardware Trojan detection based on artificial bee colony[J]. Journal of Shanghai Jiaotong University, 2019, 53(10): 1218–1224.
    [7]
    LIU Yanjiang, ZHAO Yiqiang, HE Jiaji, et al. A statistical test generation based on mutation analysis for improving the Hardware Trojan detection[J]. Journal of Circuits, Systems and Computers, 2020, 29(3): 2050049. doi: 10.1142/S0218126620500498
    [8]
    SALMANI H. COTD: Reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 338–350. doi: 10.1109/TIFS.2016.2613842
    [9]
    CUI Xiaotong, KOOPAHI E, WU Kaijie, et al. Hardware Trojan detection using the order of path delay[J]. ACM Journal on Emerging Technologies in Computing Systems, 2018, 14(3): 33.
    [10]
    WAKSMAN A, SUOZZO M, and SETHUMADHAVAN S. FANCI: Identification of stealthy malicious logic using Boolean functional analysis[C]. The 2013 ACM SIGSAC Conference on Computer & Communications Security (ACM-CCS), Berlin, Germany, 2013: 697–708.
    [11]
    HASEGAWA K, OYA M, YANAGISAWA M, et al. Hardware Trojans classification for gate-level netlists based on machine learning[C]. 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), Sant Feliu de Guixols, Spain, 2016: 203–206.
    [12]
    HASEGAWA K, YANAGISAWA M, and TOGAWA N. Hardware Trojans classification for gate-level netlists using multi-layer neural networks[C]. 2017 IEEE 23rd International Symposium on On-line Testing and Robust System Design, Thessaloniki, Greece, 2017: 227–232.
    [13]
    HASEGAWA K, YANAGISAWA M, and TOGAWA N. Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier[C]. 2017 IEEE International Symposium on Circuits and Systems (ISCAS 2017), Baltimore, USA, 2017: 1–4.
    [14]
    HASEGAWA K, YANAGISAWA M, and TOGAWA N. A hardware-Trojan classification method utilizing boundary net structures[C]. 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, USA, 2018: 1–4.
    [15]
    Trust-Hub [EB/OL]. http://www.trust-hub.org, 2021.
    [16]
    ZHANG Jie, YUAN Feng, and XU Qiang. DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans[C]. The 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, USA, 2014: 153–166.
    [17]
    HUANG Zhao, WANG Quan, CHEN Yin, et al. A survey on machine learning against hardware Trojan attacks: Recent advances and challenges[J]. IEEE Access, 2020, 8: 10796–10826. doi: 10.1109/ACCESS.2020.2965016
    [18]
    BHUNIA S, HSIAO M S, BANGA M, et al. Hardware Trojan attacks: Threat analysis and countermeasures[J]. Proceedings of the IEEE, 2014, 102(8): 1229–1247. doi: 10.1109/JPROC.2014.2334493
    [19]
    HU Wei, CHANG C H, SENGUPTA A, et al. An overview of hardware security and trust: Threats, countermeasures, and design tools[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 40(6): 1010–1038. doi: 10.1109/TCAD.2020.3047976
    [20]
    CHEN Tianqi and GUESTRIN C. XGBoost: A scalable tree boosting system[C]. The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, USA, 2016: 785–794.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(1)

    Article Metrics

    Article views (936) PDF downloads(83) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return