HTrans: Transformer-based Method for Hardware Trojan Detection and Localization

被引:0
|
作者
Li, Yilin [1 ]
Li, Shan [1 ]
Shen, Haihua [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
hardware Trojan detection; security; deep learning;
D O I
10.1109/ATS59501.2023.10317971
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is a malicious code intentionally inserted into the original circuit design to modify the original function, leak information or decrease the performance. Circuit fabrications have increased Third-Party Intellectual Property (3PIP) usage with market pressure and the increasing global economy. Consequently, hardware may become vulnerable to a wide range of attacks at some stage of the manufacturing process, making detecting HT a necessary procedure. HT detection in the early stage is crucial because removing HT and re-designing the circuit later or after fabrication could be expensive. In this work, we propose a novel Transformer-based Method for pre-silicon HT detection and localization called HTrans. We innovatively use Graph Convolutional Network (GCN) as a preprocessing stage before the Transformer, giving our model the scalability to any design size. Experiments on the Trusthub benchmark show that our model achieves an average of 96.7% F1 score on HT detection and 91.7% accuracy on HT localization. In addition, HTrans can quickly complete the detection on the Register Transfer Level (RTL) within a second.
引用
收藏
页码:31 / 36
页数:6
相关论文
共 50 条
  • [1] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    [J]. Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [2] Hardware Trojan detection and localization based on local detectors
    Bazzazi, Amin
    Manzuri Shalmani, Mohammad Taghi
    Hemmatyar, Ali Mohammad Afshin
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (03) : 1403 - 1416
  • [3] Hardware Trojan detection and localization based on local detectors
    Bazzazi, Amin
    Manzuri Shalmani, Mohammad Taghi
    Hemmatyar, Ali Mohammad Afshin
    [J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2018, 26 (03): : 1403 - 1416
  • [4] Activity Factor Based Hardware Trojan Detection and Localization
    Tang, Yongkang
    Fang, Liang
    Li, Shaoqing
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (03): : 293 - 302
  • [5] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    [J]. CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [6] Transformer-Based Microbubble Localization
    Gharamaleki, Sepideh K.
    Helfield, Brandon
    Rivaz, Hassan
    [J]. 2022 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IEEE IUS), 2022,
  • [7] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    [J]. China Communications, 2019, 16 (12) : 100 - 110
  • [8] Hardware Trojan detection method based on circuit activity
    Zhao, Yiqiang
    Xie, Xiaotian
    Liu, Yanjiang
    Liu, Aqiang
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [9] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [10] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    [J]. IEEE ACCESS, 2019, 7 : 44632 - 44644