Hardware Trojan Detection Based on SRC

被引:0
|
作者
Sun, Chen [1 ]
Cheng, Liye [1 ]
Wang, Liwei [1 ]
Huang, Yun [1 ]
机构
[1] Sci & Technol Reliabil Phys & Applicat Elect Comp, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Hardware Trojan; machine learning; sparse representation-based classifier (SRC);
D O I
10.1109/YAC51587.2020.9337595
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of integrated circuits (IC) plays a very significant role on military, economy, communication and other industries. Due to the globalization of the integrated circuit (IC) from design to manufacturing process, the IC chip is vulnerable to be implanted malicious circuit, which is known as hardware Trojan (HT). When the HT is activated, it will modify the functionality, reduce the reliability of IC, and even leak confidential information about the system and seriously threatens national security. The HT detection theory and method is hotspot in the security of integrated circuit. However, most methods are focusing on the simulated data. Moreover, the measurement data of the real circuit are greatly affected by the measurement noise and process disturbances and few methods are available with small size of the Trojan circuit. In this paper, the problem of detection was cast as signal representation among multiple linear regression and sparse representation-based classifier (SRC) were first applied for Trojan detection. We assume that the training samples from a single class do lie on a subspace, and the test samples can be represented by the single class. The proposed SRC HT detection method on real integrated circuit shows high accuracy and efficiency.
引用
收藏
页码:472 / 475
页数:4
相关论文
共 50 条
  • [21] A New Hardware Trojan Detection System Based on CRON
    Meng, Jia
    Ren, Qiang
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM 2019), 2019, : 246 - 251
  • [22] Hardware Trojan Detection Based on Multiple Structural Features
    Yan Yingjian
    Zhao Conghui
    Liu Yanjiang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (08) : 2128 - 2139
  • [23] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    [J]. China Communications, 2019, 16 (12) : 100 - 110
  • [24] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [25] Hardware Trojan detection method based on circuit activity
    Zhao Y.
    Xie X.
    Liu Y.
    Liu A.
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [26] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    [J]. COMPUTER, 2019, 52 (06) : 4 - 5
  • [27] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [28] A Region Based Fingerprinting for Hardware Trojan Detection and Diagnosis
    Saran, T.
    Ranjani, R.
    Devi, Nirmala M.
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2017, : 166 - 172
  • [29] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [30] Activity Factor Based Hardware Trojan Detection and Localization
    Tang, Yongkang
    Fang, Liang
    Li, Shaoqing
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (03): : 293 - 302