Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Hardware Trojan Detection Method Against Balanced Controllability Trigger Design

Published: 25 September 2023 Publication History

Abstract

HT has become a serious threat to the Internet of Things due to the globalization of the integrated circuit industry. To evade functional verification, HTs tend to have at least one trigger signal at the gate-level netlist with a very low transition probability. Based on this nature, previous studies use imbalanced controllability as a feature to detect HTs, assuming that signals with imbalanced controllability are always accompanied by low transition probability. However, this study has found out a way to create a new type of HT that has low transition probability but balanced controllability, against previous methods. Hence, current imbalanced controllability detectors are inadequate in this scenario. To address this limitation, we propose a probability-based detection method that uses unsupervised anomaly analysis to detect HTs. Our proposed method detects not only the proposed HT but also the 580 Trojan benchmarks on Trusthub. Experimental results show that our proposed detector outperforms other detectors, achieving an overall 100% true positive rate and 0.37% false positive rate on the 580 benchmarks.

References

[1]
S. Adee, “The hunt for the kill switch,” IEEE Spectr., vol. 45, no. 5, pp. 34–39, May 2008.
[2]
H. Salmani, “COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist,” IEEE Trans. Inf. Forensics Security, vol. 12, pp. 338–350, 2017.
[3]
L. Goldstein and E. Thigpen, “SCOAP: Sandia controllability/observability analysis program,” in Proc. 17th Design Autom. Conf., 1980, pp. 190–196.
[4]
H. Salmani, M. Tehranipoor, and R. Karri, “On design vulnerability analysis and trust benchmarks development,” in Proc. IEEE 31st Int. Conf. Comput. Design (ICCD), 2013, pp. 471–474.
[5]
B. Shakya, T. He, H. Salmani, D. Forte, S. Bhunia, and M. Tehranipoor, “Benchmarking of hardware trojans and maliciously affected circuits,” J. Hardw. Syst. Security, vol. 1, no. 1, pp. 85–102, 2017.
[6]
P.-Y. Lo, C.-W. Chen, W.-T. Hsu, C.-W. Chen, C.-W. Tien, and S.-Y. Kuo, “Semi-supervised trojan nets classification using anomaly detection based on SCOAP features,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2022, pp. 2423–2427.
[7]
K. Huang and Y. He, “Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3387–3400, 2020.
[8]
Y. Su, H. Shen, R. Lu, and Y. Ye, “A stealthy hardware trojan design and corresponding detection method,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2021, pp. 1–6.
[9]
J. Cruz, Y. Huang, P. Mishra, and S. Bhunia, “An automated configurable trojan insertion framework for dynamic trust benchmarks,” in Proc. Design, Autom. Test Europe Conf. Exhibition (DATE), 2018, pp. 1598–1603.
[10]
F. Brglez, “On testability analysis of combinational circuits,” in Proc. Int. Symp. Circuits Syst., 1984, pp. 221–225.
[11]
R. Mukherjee and R. S. Chakraborty, “Novel hardware trojan attack on activation parameters of FPGA-based DNN accelerators,” IEEE Embedded Syst. Lett., vol. 14, no. 3, pp. 131–134, Sep. 2022.
[12]
Supplementary-information,” 2023. [Online]. Available: https://github.com/tim-wt-hsu/Supplementary-information/blob/main/README.md
[13]
Z. He, X. Xu, and S. Deng, “Discovering cluster-based local outliers,” Pattern Recognit. Lett., vol. 24, nos. 9–10, pp. 1641–1650, 2003.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Embedded Systems Letters
IEEE Embedded Systems Letters  Volume 16, Issue 2
June 2024
162 pages

Publisher

IEEE Press

Publication History

Published: 25 September 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media