Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures


IEICE TRANSACTIONS on Information and Systems   Vol.E103-D   No.7   pp.1618-1622
Publication Date: 2020/07/01
Publicized: 2020/03/19
Online ISSN: 1745-1361
DOI: 10.1587/transinf.2019ICL0003
Type of Manuscript: Special Section LETTER (Special Section on Information and Communication System Security)
Category: Network and System Security
hardware Trojan,  gate-level netlist,  Trojan feature,  boundary nets,  hardware design,  

Full Text: PDF>>
Buy this Article

Cybersecurity has become a serious concern in our daily lives. The malicious functions inserted into hardware devices have been well known as hardware Trojans. In this letter, we propose a hardware-Trojan classification method at gate-level netlists utilizing boundary net structures. We first use a machine-learning-based hardware-Trojan detection method and classify the nets in a given netlist into a set of normal nets and a set of Trojan nets. Based on the classification results, we investigate the net structures around the boundary between normal nets and Trojan nets, and extract the features of the nets mistakenly identified to be normal nets or Trojan nets. Finally, based on the extracted features of the boundary nets, we again classify the nets in a given netlist into a set of normal nets and a set of Trojan nets. The experimental results demonstrate that our proposed method outperforms an existing machine-learning-based hardware-Trojan detection method in terms of its true positive rate.