Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3670474.3685955acmconferencesArticle/Chapter ViewAbstractPublication PagesmlcadConference Proceedingsconference-collections
research-article

An Efficient ML-based Hardware Trojan Localization Framework for RTL Security Analysis

Published: 09 September 2024 Publication History

Abstract

Recently, the scale of IC designs has been growing rapidly. Due to the popularity of untrusted third-party EDA tools and IP cores, IC designs face the risk of being infected by hardware Trojans (HT), highlighting the increasing importance of EDA for hardware security. RTL designs offer higher flexibility and abstraction level than gate-level netlists, with the potential for faster and more accurate localization of HTs. However, existing HT localization techniques on RTL often exhibit high complexity and low localization resolution, hindering the HT detection and code correction of large-scale applications. To overcome these limitations, we propose an ML-based HT localization framework. We innovatively transform RTL codes into signal transfer graph (STG), reducing the number of digraph nodes by 81%. Additionally, we propose an HT feature description method based on circuit structure and graph centrality, according to which we can achieve signal-level HT localization. Our results show that this method achieves an average of 98% recall, 100% TNR, 99% precision, and 98% F1-measure, outperforming the existing HT localization methods based on RTL analysis.

References

[1]
Jonathan Cruz, Farimah Farahmandi, Alif Ahmed, and Prabhat Mishra. 2018. Hardware Trojan detection using ATPG and model checking. In 2018 31st international conference on VLSI design and 2018 17th international conference on embedded systems (VLSID). IEEE, 91--96.
[2]
Kevin Immanuel Gubbi, Banafsheh Saber Latibari, Anirudh Srikanth, Tyler Sheaves, Sayed Arash Beheshti-Shirazi, Sai Manoj PD, Satareh Rafatirad, Avesta Sasan, Houman Homayoun, and Soheil Salehi. 2023. Hardware trojan detection using machine learning: A tutorial. ACM Transactions on Embedded Computing Systems 22, 3 (2023), 1--26.
[3]
Tao Han, Yuze Wang, and Peng Liu. 2019. Hardware trojans detection at register transfer level based on machine learning. In 2019 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1--5.
[4]
Kento Hasegawa, Masaru Oya, Masao Yanagisawa, and Nozomu Togawa. 2016. Hardware Trojans classification for gate-level netlists based on machine learning. In 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 203--206.
[5]
Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa. 2017. Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, 227--232.
[6]
Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa. 2017. Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. In 2017 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1--4.
[7]
Mona Hashemi, Amirabbas Momeni, A Pashrashid, and Siamak Mohammadi. 2022. Graph centrality algorithms for hardware trojan detection at gate-level netlists. International Journal of Engineering 35, 7 (2022), 1375--1387.
[8]
Rakibul Hassan, Xingyu Meng, Kanad Basu, and Sai Manoj Pudukotai Dinakarrao. 2023. Circuit topology-aware vaccination-based hardware trojan detection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023).
[9]
Matthew Hicks, Murph Finnicum, Samuel T King, Milo MK Martin, and Jonathan M Smith. 2010. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In 2010 IEEE symposium on security and privacy. IEEE, 159--172.
[10]
Hao Huang, Haihua Shen, Shan Li, and Huawei Li. 2022. A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features. In 2022 IEEE 31st Asian Test Symposium (ATS). IEEE, 138--143.
[11]
Rijoy Mukherjee, Sree Ranjani Rajendran, and Rajat Subhra Chakraborty. 2022. A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention. Journal of Cryptographic Engineering 12, 4 (2022), 495--522.
[12]
Shinya Takamaeda-Yamazaki. 2015. Pyverilog: A python-based hardware design processing toolkit for verilog hdl. In Applied Re configurable Computing: 11th International Symposium, ARC 2015, Bochum, Germany, April 13-17, 2015, Proceedings 11. Springer, 451--460.
[13]
Mohammad Tehranipoor and Farinaz Koushanfar. 2010. A survey of hardware trojan taxonomy and detection. IEEE design & test of computers 27, 1 (2010), 10--25.
[14]
Trust-HUB. 2021. http://www.trust-hub.org.
[15]
Rozhin Yasaei, Sina Faezi, and Mohammad Abdullah Al Faruque. 2022. Golden reference-free hardware trojan localization using graph convolutional network. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30, 10 (2022), 1401--1411.
[16]
Rozhin Yasaei, Shih-Yuan Yu, and Mohammad Abdullah Al Faruque. 2021. Gnn4tj: Graph neural networks for hardware trojan detection at register transfer level. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1504--1509.
[17]
Shichao Yu, Chongyan Gu, Weiqiang Liu, and Maire O'Neill. 2020. A novel feature extraction strategy for hardware trojan detection. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1--5.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MLCAD '24: Proceedings of the 2024 ACM/IEEE International Symposium on Machine Learning for CAD
September 2024
321 pages
ISBN:9798400706998
DOI:10.1145/3670474
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hardware Trojan localization
  2. Hardware security
  3. Machine learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MLCAD '24
Sponsor:

Acceptance Rates

MLCAD '24 Paper Acceptance Rate 35 of 83 submissions, 42%;
Overall Acceptance Rate 35 of 83 submissions, 42%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 74
    Total Downloads
  • Downloads (Last 12 months)74
  • Downloads (Last 6 weeks)23
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media