Hardware Trojan Free Netlist Identification: A Clustering Approach

被引:4
|
作者
Mondal, Anindan [1 ]
Biswal, Rajesh Kumar [1 ]
Mahalat, Mahabub Hasan [1 ]
Roy, Suchismita [1 ]
Sen, Bibhash [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Durgapur, India
关键词
Hardware Trojan; Transition Probability; SCOAP Measurements; k-Means Clustering; CONTROLLABILITY; OBSERVABILITY;
D O I
10.1007/s10836-021-05953-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware Trojans (HT) have emerged as a significant threat to both the IC industry and the military due to their stealthy nature and destructive capabilities. An HT is a small piece of hardware (circuit) embedded by an adversary to disrupt the victim circuit's regular operation. As a result, it becomes an utmost necessity to distinguish standard signals from them. The detection of HT has become critical due to the presence of enormous search space combined with its small size. A clustering-based approach is proposed to identify benign signals in this work. The proposed approach combines both transition probability and combinational controllability to generate an effective HT free whitelist. It reduces the overhead of search space for HT detection. The clusters generated (whitelist) are analyzed in the presence of several ultra-small triggers which advocates the efficacy of the proposed solution. Simulation results on various ISCAS benchmark circuits validate the significance and quality of such clusters in terms of observed transition. Experimental results also underpin the proposed methodology's superiority over existing techniques by identifying proper whitelist easily.
引用
收藏
页码:317 / 328
页数:12
相关论文
共 50 条
  • [21] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman., A
    [J]. Proceedings - 2021 IEEE International Symposium on Smart Electronic Systems, iSES 2021, 2021, : 177 - 182
  • [22] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman, A.
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182
  • [23] SEC: A simple and effective netlist clustering
    Seong, KS
    Kyoung, SJ
    Kyung, CM
    [J]. ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 1688 - 1691
  • [24] Gradual-N-Justification (GNJ) to Reduce False-Positive Hardware Trojan Detection in Gate-Level Netlist
    Salmani, Hassan
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 30 (04) : 515 - 525
  • [25] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    [J]. TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
  • [26] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [27] SRAM Hardware Trojan
    Saeidi, Roghayeh
    Garakani, Hossein Gharaee
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
  • [28] Hardware Trojan Detection Game: A Prospect-Theoretic Approach
    Saad, Walid
    Sanjab, Anibal
    Wang, Yunpeng
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) : 7697 - 7710
  • [29] An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation
    Marcelli, Andrea
    Restifo, Marco
    Sanchez, Ernesto
    Squillero, Giovanni
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1593 - 1598
  • [30] Detection of Hardware Trojan Horse using Unsupervised Learning Approach
    Samyukta, K.
    Ramesh, S.R.
    [J]. 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82