Graph Centrality Algorithms for Hardware Trojan Detection at Gate-Level Netlists
نویسندگان
چکیده
The rapid growth in the supply chain of electronic devices has led companies to purchase Intellectual Property or Integrated Circuits from unreliable sources. This dispersion design fabrication stages IP/IC new attacks called hardware Trojans. Hardware Trojans can bargain information, reduce performance, cause failure. Various methods have been introduced detect prevent Machine learning are one these. Selecting type and number input variables algorithm an important role performance model. Some previous Trojan detection studies used structural gate-level features create data sets for machine models. In this paper, a method based on directed graphs extracting is proposed. proposed use Graph Centrality Algorithm features. To examine importance impact extracted with method, three types created as model made XGBoost. trained models these show that graph-based improved F1-score by 10% ROC 22%. combination 17.5% 38.5%.
منابع مشابه
Formal Methods for Reverse Engineering Gate-Level Netlists
Components An abstract component α is a triple (I, O,S), where I and O are sets of input and output signals, respectively, and S is a formal specification defining allowed input-output behavior of the component. An instance of an abstract component α is any circuit or netlist that satisfies the specification S of α. We illustrate the notion of an abstract component using an example. Example 2. ...
متن کاملSystem-level protection and hardware Trojan detection using weighted voting☆
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملA Hardware Trojan Detection Framework
In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...
متن کاملPaper category: Evolvable Hardware Digital FIR Filter Design at Gate-level using Evolutionary Algorithms
Traditionally digital filters are designed using the concept of a linear difference equation with the output response being a weighted sum of signal samples with usually floating point coefficients. Unfortunately such a model is necessarily expensive in terms of hardware as it requires many large bit additions and multiplications. In this paper it is shown how it is possible to evolve a tiny fe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of engineering. Transactions A: basics
سال: 2022
ISSN: ['1728-1431']
DOI: https://doi.org/10.5829/ije.2022.35.07a.16