Graph Centrality Algorithms for Hardware Trojan Detection at Gate-Level Netlists

نویسندگان

چکیده

The rapid growth in the supply chain of electronic devices has led companies to purchase Intellectual Property or Integrated Circuits from unreliable sources. This dispersion design fabrication stages IP/IC new attacks called hardware Trojans. Hardware Trojans can bargain information, reduce performance, cause failure. Various methods have been introduced detect prevent Machine learning are one these. Selecting type and number input variables algorithm an important role performance model. Some previous Trojan detection studies used structural gate-level features create data sets for machine models. In this paper, a method based on directed graphs extracting is proposed. proposed use Graph Centrality Algorithm features. To examine importance impact extracted with method, three types created as model made XGBoost. trained models these show that graph-based improved F1-score by 10% ROC 22%. combination 17.5% 38.5%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Methods for Reverse Engineering Gate-Level Netlists

Components An abstract component α is a triple (I, O,S), where I and O are sets of input and output signals, respectively, and S is a formal specification defining allowed input-output behavior of the component. An instance of an abstract component α is any circuit or netlist that satisfies the specification S of α. We illustrate the notion of an abstract component using an example. Example 2. ...

متن کامل

System-level protection and hardware Trojan detection using weighted voting☆

The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...

متن کامل

Hardware Trojan Identification and Detection

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

متن کامل

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

Paper category: Evolvable Hardware Digital FIR Filter Design at Gate-level using Evolutionary Algorithms

Traditionally digital filters are designed using the concept of a linear difference equation with the output response being a weighted sum of signal samples with usually floating point coefficients. Unfortunately such a model is necessarily expensive in terms of hardware as it requires many large bit additions and multiplications. In this paper it is shown how it is possible to evolve a tiny fe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of engineering. Transactions A: basics

سال: 2022

ISSN: ['1728-1431']

DOI: https://doi.org/10.5829/ije.2022.35.07a.16