Citation: | Ying ZHANG, Shen LI, Xin CHEN, Jiaqi YAO, Zhiming MAO. Hybrid Multi-level Hardware Trojan Detection Method for Gate-level Netlists Based on XGBoost[J]. Journal of Electronics & Information Technology, 2021, 43(10): 3050-3057. doi: 10.11999/JEIT200874 |
[1] |
ELNAGGAR R, CHAKRABARTY K, and TAHOORI M B. Hardware Trojan detection using changepoint-based anomaly detection techniques[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019, 27(12): 2706–2719. doi: 10.1109/TVLSI.2019.2925807
|
[2] |
CHEN Jinghui, DONG Chen, ZHANG Fan, et al. A Hardware-Trojans detection approach based on eXtreme Gradient Boosting[C]. 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), Beijing, China, 2019: 69–73.
|
[3] |
张毅军, 张晓, 林少锋, 等. 基于功耗特征的硬件木马检测方法[J]. 电脑知识与技术, 2019, 15(31): 15–16, 26.
ZHANG Yijun, ZHANG Xiao, LIN Shaofeng, et al. Hardware Trojan detection method based on power consumption features[J]. Computer Knowledge and Technology, 2019, 15(31): 15–16, 26.
|
[4] |
SAAD W, SANJAB A, WANG Yunpeng, et al. Hardware Trojan detection game: A prospect-theoretic approach[J]. IEEE Transactions on Vehicular Technology, 2017, 66(9): 7697–7710. doi: 10.1109/TVT.2017.2686853
|
[5] |
佟鑫, 李莹, 陈岚. SVM算法在硬件木马旁路分析检测中的应用[J]. 电子与信息学报, 2020, 42(7): 1643–1651. doi: 10.11999/JEIT190532
TONG Xin, LI Ying, and CHEN Lan. Application of SVM machine learning to hardware Trojan detection using side-channel analysis[J]. Journal of Electronics &Information Technology, 2020, 42(7): 1643–1651. doi: 10.11999/JEIT190532
|
[6] |
王晓晗, 王韬, 李雄伟, 等. 基于人工蜂群的硬件木马测试向量生成方法[J]. 上海交通大学学报, 2019, 53(10): 1218–1224.
WANG Xiaohan, WANG Tao, LI Xiongwei, et al. Test pattern generation method for hardware Trojan detection based on artificial bee colony[J]. Journal of Shanghai Jiaotong University, 2019, 53(10): 1218–1224.
|
[7] |
LIU Yanjiang, ZHAO Yiqiang, HE Jiaji, et al. A statistical test generation based on mutation analysis for improving the Hardware Trojan detection[J]. Journal of Circuits, Systems and Computers, 2020, 29(3): 2050049. doi: 10.1142/S0218126620500498
|
[8] |
SALMANI H. COTD: Reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 338–350. doi: 10.1109/TIFS.2016.2613842
|
[9] |
CUI Xiaotong, KOOPAHI E, WU Kaijie, et al. Hardware Trojan detection using the order of path delay[J]. ACM Journal on Emerging Technologies in Computing Systems, 2018, 14(3): 33.
|
[10] |
WAKSMAN A, SUOZZO M, and SETHUMADHAVAN S. FANCI: Identification of stealthy malicious logic using Boolean functional analysis[C]. The 2013 ACM SIGSAC Conference on Computer & Communications Security (ACM-CCS), Berlin, Germany, 2013: 697–708.
|
[11] |
HASEGAWA K, OYA M, YANAGISAWA M, et al. Hardware Trojans classification for gate-level netlists based on machine learning[C]. 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), Sant Feliu de Guixols, Spain, 2016: 203–206.
|
[12] |
HASEGAWA K, YANAGISAWA M, and TOGAWA N. Hardware Trojans classification for gate-level netlists using multi-layer neural networks[C]. 2017 IEEE 23rd International Symposium on On-line Testing and Robust System Design, Thessaloniki, Greece, 2017: 227–232.
|
[13] |
HASEGAWA K, YANAGISAWA M, and TOGAWA N. Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier[C]. 2017 IEEE International Symposium on Circuits and Systems (ISCAS 2017), Baltimore, USA, 2017: 1–4.
|
[14] |
HASEGAWA K, YANAGISAWA M, and TOGAWA N. A hardware-Trojan classification method utilizing boundary net structures[C]. 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, USA, 2018: 1–4.
|
[15] |
Trust-Hub [EB/OL]. http://www.trust-hub.org, 2021.
|
[16] |
ZHANG Jie, YUAN Feng, and XU Qiang. DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans[C]. The 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, USA, 2014: 153–166.
|
[17] |
HUANG Zhao, WANG Quan, CHEN Yin, et al. A survey on machine learning against hardware Trojan attacks: Recent advances and challenges[J]. IEEE Access, 2020, 8: 10796–10826. doi: 10.1109/ACCESS.2020.2965016
|
[18] |
BHUNIA S, HSIAO M S, BANGA M, et al. Hardware Trojan attacks: Threat analysis and countermeasures[J]. Proceedings of the IEEE, 2014, 102(8): 1229–1247. doi: 10.1109/JPROC.2014.2334493
|
[19] |
HU Wei, CHANG C H, SENGUPTA A, et al. An overview of hardware security and trust: Threats, countermeasures, and design tools[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 40(6): 1010–1038. doi: 10.1109/TCAD.2020.3047976
|
[20] |
CHEN Tianqi and GUESTRIN C. XGBoost: A scalable tree boosting system[C]. The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, USA, 2016: 785–794.
|