{"title":"Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques","authors":"Chia-Heng Yen, Jung-Che Tsai, Kai-Chiang Wu","doi":"10.1109/ISQED57927.2023.10129300","DOIUrl":null,"url":null,"abstract":"As the outsourcing process in the design and fabrication to third parties becomes more popular in the IC industry, the consciousness of hardware security has been rising these years. In this paper, we propose a novel method for hardware Trojan detection using specific path features at the gate level. In the training flow, path classifiers can be trained with SVM and RF algorithms using the path features from the trained circuits. In the classifying flow, an average of 0.96 on the F1-score in the results of the path classification demonstrates that logical paths can be easily classified into Trojan paths and Trojan-free paths with the trained path classifiers. In the localizing flow, the intersections between the logical paths can be favorable for precisely localizing the Trojan gates. As the FPRs are kept low to prevent normal gates from misclassifying into the Trojan gates, the high TPRs can be obtained for localizing the Trojan gates with the proposed scoring method.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 24th International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED57927.2023.10129300","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
As the outsourcing process in the design and fabrication to third parties becomes more popular in the IC industry, the consciousness of hardware security has been rising these years. In this paper, we propose a novel method for hardware Trojan detection using specific path features at the gate level. In the training flow, path classifiers can be trained with SVM and RF algorithms using the path features from the trained circuits. In the classifying flow, an average of 0.96 on the F1-score in the results of the path classification demonstrates that logical paths can be easily classified into Trojan paths and Trojan-free paths with the trained path classifiers. In the localizing flow, the intersections between the logical paths can be favorable for precisely localizing the Trojan gates. As the FPRs are kept low to prevent normal gates from misclassifying into the Trojan gates, the high TPRs can be obtained for localizing the Trojan gates with the proposed scoring method.