HTrans: Transformer-based Method for Hardware Trojan Detection and Localization

被引:0
|
作者
Li, Yilin [1 ]
Li, Shan [1 ]
Shen, Haihua [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
hardware Trojan detection; security; deep learning;
D O I
10.1109/ATS59501.2023.10317971
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is a malicious code intentionally inserted into the original circuit design to modify the original function, leak information or decrease the performance. Circuit fabrications have increased Third-Party Intellectual Property (3PIP) usage with market pressure and the increasing global economy. Consequently, hardware may become vulnerable to a wide range of attacks at some stage of the manufacturing process, making detecting HT a necessary procedure. HT detection in the early stage is crucial because removing HT and re-designing the circuit later or after fabrication could be expensive. In this work, we propose a novel Transformer-based Method for pre-silicon HT detection and localization called HTrans. We innovatively use Graph Convolutional Network (GCN) as a preprocessing stage before the Transformer, giving our model the scalability to any design size. Experiments on the Trusthub benchmark show that our model achieves an average of 96.7% F1 score on HT detection and 91.7% accuracy on HT localization. In addition, HTrans can quickly complete the detection on the Register Transfer Level (RTL) within a second.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [21] Hardware Trojan Detection Method Based on Time Feature of Chip Temperature
    Yang, Lian
    Li, Xiong
    Li, Huan
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 1029 - 1032
  • [22] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [23] A Transformer-Based DeepFake-Detection Method for Facial Organs
    Xue, Ziyu
    Liu, Qingtong
    Shi, Haichao
    Zou, Ruoyu
    Jiang, Xiuhua
    ELECTRONICS, 2022, 11 (24)
  • [24] Hardware Trojan Detection Method Based on Enhanced Local Outlier Factor
    Nie, Tingyuan
    Nie, Jingjing
    Zhao, Kun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (02)
  • [25] A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
    Wang Xiaohan
    Wang Tao
    Li Xiongwei
    Zhang Yang
    Huang Changyang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (12) : 3043 - 3050
  • [26] A Detection Method of Hardware Trojan Based on Two-Dimension Calibration
    Sui, Qiang
    Wu, Zhikai
    Li, Jun
    Li, Shaoqing
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2795 - 2799
  • [27] A Deep Learning Method Based on the Attention Mechanism for Hardware Trojan Detection
    Tang, Wenjing
    Su, Jing
    He, Jiaji
    Gao, Yuchan
    ELECTRONICS, 2022, 11 (15)
  • [28] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [29] Transformer-Based Method for Unsupervised Anomaly Detection of Flight Data
    Yu, Hao
    Wu, Honglan
    Sun, Youchao
    Liu, Hao
    2023 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON AEROSPACE TECHNOLOGY, VOL I, APISAT 2023, 2024, 1050 : 1816 - 1826
  • [30] TADL: Fault Localization with Transformer-based Anomaly Detection for Dynamic Microservice Systems
    Li, Yuewei
    Lu, Yan
    Wang, Jingyu
    Qi, Qi
    Wang, Jing
    Wang, Yingying
    Liao, Jianxin
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING, SANER, 2023, : 718 - 722