HTrans: Transformer-based Method for Hardware Trojan Detection and Localization

被引:0
|
作者
Li, Yilin [1 ]
Li, Shan [1 ]
Shen, Haihua [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
hardware Trojan detection; security; deep learning;
D O I
10.1109/ATS59501.2023.10317971
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is a malicious code intentionally inserted into the original circuit design to modify the original function, leak information or decrease the performance. Circuit fabrications have increased Third-Party Intellectual Property (3PIP) usage with market pressure and the increasing global economy. Consequently, hardware may become vulnerable to a wide range of attacks at some stage of the manufacturing process, making detecting HT a necessary procedure. HT detection in the early stage is crucial because removing HT and re-designing the circuit later or after fabrication could be expensive. In this work, we propose a novel Transformer-based Method for pre-silicon HT detection and localization called HTrans. We innovatively use Graph Convolutional Network (GCN) as a preprocessing stage before the Transformer, giving our model the scalability to any design size. Experiments on the Trusthub benchmark show that our model achieves an average of 96.7% F1 score on HT detection and 91.7% accuracy on HT localization. In addition, HTrans can quickly complete the detection on the Register Transfer Level (RTL) within a second.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [31] TSLocator: A Transformer-Based Approach to Bug Localization
    HUCheng
    XIAOYuliang
    WuhanUniversityJournalofNaturalSciences, 2021, 26 (02) : 200 - 206
  • [32] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [33] Transformer-Based Approach to Melanoma Detection
    Cirrincione, Giansalvo
    Cannata, Sergio
    Cicceri, Giovanni
    Prinzi, Francesco
    Currieri, Tiziana
    Lovino, Marta
    Militello, Carmelo
    Pasero, Eros
    Vitabile, Salvatore
    SENSORS, 2023, 23 (12)
  • [34] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [35] A Transformer-Based GAN for Anomaly Detection
    Yang, Caiyin
    Lan, Shiyong
    Huangl, Weikang
    Wang, Wenwu
    Liul, Guoliang
    Yang, Hongyu
    Ma, Wei
    Li, Piaoyang
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT II, 2022, 13530 : 345 - 357
  • [36] A transformer-based convolutional local attention (ConvLoA) method for temporal action localization
    Artham, Sainithin
    Shaikh, Soharab Hossain
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024,
  • [37] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [38] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [39] Transformer-Based Fire Detection in Videos
    Mardani, Konstantina
    Vretos, Nicholas
    Daras, Petros
    SENSORS, 2023, 23 (06)
  • [40] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407