HTrans: Transformer-based Method for Hardware Trojan Detection and Localization

被引:0
|
作者
Li, Yilin [1 ]
Li, Shan [1 ]
Shen, Haihua [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
hardware Trojan detection; security; deep learning;
D O I
10.1109/ATS59501.2023.10317971
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is a malicious code intentionally inserted into the original circuit design to modify the original function, leak information or decrease the performance. Circuit fabrications have increased Third-Party Intellectual Property (3PIP) usage with market pressure and the increasing global economy. Consequently, hardware may become vulnerable to a wide range of attacks at some stage of the manufacturing process, making detecting HT a necessary procedure. HT detection in the early stage is crucial because removing HT and re-designing the circuit later or after fabrication could be expensive. In this work, we propose a novel Transformer-based Method for pre-silicon HT detection and localization called HTrans. We innovatively use Graph Convolutional Network (GCN) as a preprocessing stage before the Transformer, giving our model the scalability to any design size. Experiments on the Trusthub benchmark show that our model achieves an average of 96.7% F1 score on HT detection and 91.7% accuracy on HT localization. In addition, HTrans can quickly complete the detection on the Register Transfer Level (RTL) within a second.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [41] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [42] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [43] Transformer-based fall detection in videos
    Nunez-Marcos, Adrian
    Arganda-Carreras, Ignacio
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 132
  • [44] Transformer-based Text Detection in the Wild
    Raisi, Zobeir
    Naiel, Mohamed A.
    Younes, Georges
    Wardell, Steven
    Zelek, John S.
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2021, 2021, : 3156 - 3165
  • [45] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [46] A Board-level Hardware Trojan Detection Method
    Zhang, Yang
    Wang, Jian
    Yang, Zhaorui
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15
  • [47] A stealthy Hardware Trojan design and corresponding detection method
    Su, Yu
    Shen, Haihua
    Lu, Renjie
    Ye, Yunying
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [48] A Bio-Inspired Method for Hardware Trojan Detection
    Ghohroud, Najmeh Farajipour
    Hessabi, Shaahin
    2017 19TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND DIGITAL SYSTEMS (CADS), 2017, : 10 - 11
  • [49] A transformer-based image detection method for grassland situation of alpine meadows
    Zhang, Yuzhuo
    Wang, Tianyi
    You, Yong
    Wang, Decheng
    Gao, Jinlong
    Liang, Tiangang
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2023, 210
  • [50] LMDet: A "Naturalness" Statistical Method for Hardware Trojan Detection
    Shen, Haihua
    Tan, Huazhe
    Li, Huawei
    Zhang, Feng
    Li, Xiaowei
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (04) : 720 - 732