A Hardware Trojan Detection Method for Gate-Level Netlists Employing the CAMELOT Measure

被引:1
|
作者
Priyadharshini, M. [1 ]
Saravanan, P. [1 ]
Charukesh, V [2 ]
Fathima, Nihar Ahamed A. [1 ]
机构
[1] PSG Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, India
关键词
Hardware Trojan; CAMELOT; K-NN; Machine Learning;
D O I
10.1109/ICDCS59278.2024.10560972
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, hardware designs are at an all-time high demand which has forced manufacturers to procure intellectual property from third-party vendors. Nevertheless, the third-party intellectual property can provide a route to major security concerns like hardware trojan. Most of the hardware trojan detection methods for such large circuits are deployed on side-channel analysis. The increase in process variations and the decrease in the size of the hardware trojan decreased the sensitivity of the side channel-based approach. In this proposed work, the testability feature of Computer-Aided MEasure for LOgic Testability, also known as CAMELOT is used to detect Hardware Trojans. This technique uses controllability - a combinational testability measure that is calculated using CAMELOT in detecting hardware trojans using the machine learning method. This work also makes use of the level of a logic gate as another feature in this detection process. This method deploys the K-Nearest Neighbour machine learning algorithm. The obtained results with experiments conducted on ISCAS-85 benchmark circuits demonstrate that CAMELOT, in addition to the level of the gate as features, detects hardware trojans with an accuracy and recall of 100%.
引用
收藏
页码:183 / 187
页数:5
相关论文
共 50 条
  • [41] PLaNe: Reverse Engineering of Planar Layouts to Gate-Level Netlists
    Putz, Maximilian
    Ludwig, Matthias
    Lippmann, Bernhard
    Graeb, Helmut
    2023 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS, PAINE, 2023, : 171 - 177
  • [42] COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
    Salmani, Hassan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 338 - 350
  • [43] Hardware-Trojans Rank:Quantitative Evaluation of Security Threats at Gate-Level Netlists by Pattern Matching
    Oya, Masaru
    Yamashita, Noritaka
    Okamura, Toshihiko
    Tsunoo, Yukiyasu
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (12) : 2335 - 2347
  • [44] Gradual-N-Justification (GNJ) to Reduce False-Positive Hardware Trojan Detection in Gate-Level Netlist
    Salmani, Hassan
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 30 (04) : 515 - 525
  • [45] Single-Triggered Hardware Trojan Identification Based on Gate-Level Circuit Structural Characteristics
    Chen, Fuqiang
    Liu, Qiang
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [46] Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures
    Hasegawa, Kento
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (07) : 1618 - 1622
  • [47] Graph based heterogeneous feature extraction for enhanced hardware Trojan detection at gate-level using optimized XGBoost algorithm
    Devi, M. Nirmala
    Sankar, Vaishnavi
    MEASUREMENT, 2023, 220
  • [48] A Hardware Trojan Insertion Framework against Gate-Level Netlist Structural Feature-based and SCOAP-based Detection
    Chen, Chi-Wei
    Lo, Pei-Yu
    Hsu, Wei-Ting
    Chen, Chih-Wei
    Tien, Chin-Wei
    Kuo, Sy-Yen
    2022 IEEE 65TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS 2022), 2022,
  • [49] A gate-level model for morphogenetic evolvable hardware
    Lee, J
    Sitte, J
    2004 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2004, : 113 - 119
  • [50] A Board-level Hardware Trojan Detection Method
    Zhang, Yang
    Wang, Jian
    Yang, Zhaorui
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15