Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability

The datasets analysed during the current study are available in the TRUST-HUB repository, available at https://trust-hub.org/.

References

  1. Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283–1295

    Article  Google Scholar 

  2. Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229–1247

    Article  Google Scholar 

  3. Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express

  4. Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S (2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust

  5. Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security

  6. Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161

    Article  Google Scholar 

  7. Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537–2546

    Article  Google Scholar 

  8. Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350

    Article  Google Scholar 

  9. Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express. vol. 14, no. 18

  10. Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17

  11. Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. in 17th Design Automation Conference

  12. Dharmadhikari P, Raju A, Vemuri R (2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI)

  13. Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M (2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS)

  14. Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS)

  15. Bian R, Xue M, Wang J (2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security

  16. Wang Y, Han T, Han X, Liu P (2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS)

  17. Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632–44644

    Article  Google Scholar 

  18. Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)

  19. Cruz J, Farahmandi F, Ahmed A Mishra P (2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID)

  20. Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC)

  21. Tebianian M, Mokhtarpour A, Shafieinejad A STMT : SCOAP Testability Measurement Tool. [Online]. Available: https://github.com/azadehmokhtarpour/SCOAP-values-computation-STMT.

  22. Samimi SMS Testability Measurement Tool. Available: https://sourceforge.net/projects/testabilitymeasurementtool/.

  23. Trust-Hub Benchmarks. [Online]. Available: https://trust-hub.org/.

  24. Olson DL, Delen D (2008) Advanced Data Mining Techniques, 1st edition ed., Springer, p. 138

  25. Agrawal VD (2006) Auburn University, ELEC7250-001 VLSI Testing, Lecture 8: Testability Measures [Online]. Available: https://www.eng.auburn.edu/~vagrawal/COURSE/FULL/lec8a.ppt. [Accessed 16 12 2019]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azadeh Mokhtarpour.

Ethics declarations

Research Involving Human and Animal Participants

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of Interest

Mahshid Tebyanian declares that she has no conflict of interest. Azadeh Mokhtarpour declares that she has no conflict of interests. Further, Alireza Shafieinejad declares that he/she has no conflict of interest.

Additional information

Responsible Editor: S. Bhunia

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (DOCX 4463 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tebyanian, M., Mokhtarpour, A. & Shafieinejad, A. SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier. J Electron Test 37, 473–487 (2021). https://doi.org/10.1007/s10836-021-05960-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-021-05960-2

Keywords