Threshold Analysis Using Probabilistic Xgboost Classifier for Hardware Trojan Detection

被引:0
|
作者
Dhar, Tapobrata [1 ]
Das, Ranit [2 ]
Giri, Chandan [1 ]
Roy, Surajit Kumar [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Sibpur, Howrah, India
[2] Samsung Res Inst, Noida, India
关键词
Hardware Trojan; XGBoost; Variance Threshold; Receiver operating characteristic curve;
D O I
10.1007/s10836-023-06079-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The fabless nature of integrated circuits manufacturing leaves them vulnerable to modifications by ill-intentioned third party. There arises a necessity for security measures during their manufacturing to protect them from covert modifications known as hardware Trojans. Static analysis of gate-level synthesized integrated circuits can prove helpful in detecting the presence of unwanted circuitry within the host. This paper proposes a static analysis technique of gate-level integrated circuits using supervised probabilistic classifier through effective threshold analysis. New and existing relevant features are extracted that relates to hardware Trojan properties and normalised accordingly. Effective features are selected using their feature importance values. Variance threshold has been used to create a high entropy feature subset to train a supervised model using XGBoost algorithm with relevant hyperparameters. Threshold values of the probabilistic classifier are determined through analysis of threshold obtained using receiver operating characteristic and precision-recall curves. The chosen techniques showcase hardware Trojan detection with high accuracy over gate-level synthesized circuits.
引用
收藏
页码:447 / 463
页数:17
相关论文
共 50 条
  • [1] Threshold Analysis Using Probabilistic Xgboost Classifier for Hardware Trojan Detection
    Tapobrata Dhar
    Ranit Das
    Chandan Giri
    Surajit Kumar Roy
    [J]. Journal of Electronic Testing, 2023, 39 : 447 - 463
  • [2] A Threshold based Hardware Trojan Detection Technique Using XGBoost Algorithm
    Das, Ranit
    Dhar, Tapobrata
    Roy, Surajit Kumar
    [J]. 2022 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2022,
  • [3] A New Hardware Trojan Detection Technique using Class Weighted XGBoost Classifier
    Sharma, Richa
    Valivati, Nitya Kritin
    Sharma, G. K.
    Pattanaik, Manisha
    [J]. 2020 24TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2020,
  • [4] Detection and Diagnosis of Hardware Trojan Using Power Analysis
    Vaddi, Eknadh
    Gaddam, Karthik
    Maniam, Rahul Karthik
    Mallavajjala, Sai Abhishek
    Dasari, Srinivasulu
    Devi, Nirmala M.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 519 - 529
  • [5] Nonlinear Analysis for Hardware Trojan Detection
    Zhou, Errui
    Zhao, Zhixun
    Li, Shaoqing
    Ni, Lin
    [J]. 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015, : 793 - 796
  • [6] Detection and analysis of hardware trojan using scan chain method
    Rithesh, M.
    Ram, Bhargav B., V
    Harish, G.
    Yellampalli, Siva
    [J]. 2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [7] On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
    Labafniya, Mansoureh
    Picek, Stjepan
    Borujeni, Shahram Etemadi
    Mentens, Nele
    [J]. APPLIED SOFT COMPUTING, 2020, 91
  • [8] Transition Probabilistic Approach for Detection and Diagnosis of Hardware Trojan in Combinational Circuits
    Popat, Jayesh
    Mehta, Usha
    [J]. 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [9] Hardware Trojan Detection using FBHT in FPGAs
    Qayyum, Sundus
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Ul Islam, Najam
    Malik, Nazir
    [J]. PROCEEDINGS OF 2020 17TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2020, : 422 - 427
  • [10] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147