2019
DOI: 10.1109/access.2019.2908088
|View full text |Cite
|
Sign up to set email alerts
|

A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits

Abstract: Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission-critical applications. This paper proposes an HT detection method by analyzing the combined structural features of HTs and host circuits. The structural features of combinational and sequential logic HTs are extracted and form an HT feature database. An efficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 27 publications
(49 reference statements)
0
8
0
Order By: Relevance
“…Our learning model is trained only on the circuit's netlist and we do not use any other features other than the gate-types of each gate in C p . This deliberate restriction of our approach (i.e., to only use information available from the circuit netlist) is to ensure avoidance of cost associated with rich feature engineering pipelines that have been employed by previously proposed HT detection methods [12], [13], [15], [19], [28], preventing these methods from scaling to large circuit databases.…”
Section: Ht Trigger Detection With Gate-netmentioning
confidence: 99%
“…Our learning model is trained only on the circuit's netlist and we do not use any other features other than the gate-types of each gate in C p . This deliberate restriction of our approach (i.e., to only use information available from the circuit netlist) is to ensure avoidance of cost associated with rich feature engineering pipelines that have been employed by previously proposed HT detection methods [12], [13], [15], [19], [28], preventing these methods from scaling to large circuit databases.…”
Section: Ht Trigger Detection With Gate-netmentioning
confidence: 99%
“…In [17], the structural features in gate-level netlist of both the HT circuits and the host circuits are examined and combined for HT detection. This method is based on the fact that the elusiveness of HTs relies on not just HT structure design but also on the insertion positions in the host circuits, in which HTs are usually inserted at either the low controllability position or the low observability position owning the stealth characteristic.…”
Section: Prior Work On Static Hardware Trojan Detectionmentioning
confidence: 99%
“…Rajamanikkam et al [169] focused on an important threat in 3PIP: the architecture state preservation HT (TASP), and proposed three complementary techniques to detect the HT at a lower cost. Some are extremely novel methods: Liu et al [170] analyzed the combined structural characteristics of the HT and the main circuit and proposed a new HT detection technology. A feature database is constructed by extracting the structural characteristics of the combination logic and sequential logic in the group HT, and the author used the feature matching method to extract all of the features from the circuit structure.…”
Section: Specific Hts Protection Techniquesmentioning
confidence: 99%