一种用于硬件木马检测的高效机器学习方法

Ashek Seum, Md. Reasad Zaman Chowdhury, F. S. Hossain
{"title":"一种用于硬件木马检测的高效机器学习方法","authors":"Ashek Seum, Md. Reasad Zaman Chowdhury, F. S. Hossain","doi":"10.1109/ICCIT57492.2022.10055021","DOIUrl":null,"url":null,"abstract":"As outsourcing of IC manufacturing has become a global phenomenon, the risk of ICs being infested with Trojans has increased more than ever. In this paper, we propose a circuit gate level netlist based Trojan detection using supervised machine learning approaches. A number of features are extracted from the netlist that delivers a sophisticated dataset for the approximately trained model to deliver a higher true positive detection rate. The netlist is analyzed in 45 nm technology to generate features and Monte Carlo simulation is performed to generate two thousand virtual netlists, including one thousand Trojan infested netlists. We experiment with the s27 benchmark circuit netlist to evaluate our approach. Different types of sequential and combinational types of Trojans from literature are inserted into the netlist to evaluate the proposed approach. The results show significant Trojan detectability in different machine learning approaches.","PeriodicalId":255498,"journal":{"name":"2022 25th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient Machine Learning Approach for Hardware Trojan Detection\",\"authors\":\"Ashek Seum, Md. Reasad Zaman Chowdhury, F. S. Hossain\",\"doi\":\"10.1109/ICCIT57492.2022.10055021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As outsourcing of IC manufacturing has become a global phenomenon, the risk of ICs being infested with Trojans has increased more than ever. In this paper, we propose a circuit gate level netlist based Trojan detection using supervised machine learning approaches. A number of features are extracted from the netlist that delivers a sophisticated dataset for the approximately trained model to deliver a higher true positive detection rate. The netlist is analyzed in 45 nm technology to generate features and Monte Carlo simulation is performed to generate two thousand virtual netlists, including one thousand Trojan infested netlists. We experiment with the s27 benchmark circuit netlist to evaluate our approach. Different types of sequential and combinational types of Trojans from literature are inserted into the netlist to evaluate the proposed approach. The results show significant Trojan detectability in different machine learning approaches.\",\"PeriodicalId\":255498,\"journal\":{\"name\":\"2022 25th International Conference on Computer and Information Technology (ICCIT)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 25th International Conference on Computer and Information Technology (ICCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT57492.2022.10055021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 25th International Conference on Computer and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT57492.2022.10055021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着集成电路制造外包成为一种全球现象,集成电路被木马病毒感染的风险比以往任何时候都要高。在本文中,我们提出了一种基于电路门级网络列表的木马检测方法,该方法使用监督机器学习方法。从网络列表中提取了许多特征,为近似训练模型提供了复杂的数据集,以提供更高的真阳性检出率。采用45纳米技术对网络列表进行分析以生成特征,并进行蒙特卡罗模拟以生成2000个虚拟网络列表,其中包括1000个木马感染的网络列表。我们用s27基准电路网络表进行了实验,以评估我们的方法。将文献中不同类型的顺序和组合类型的木马插入到网络列表中,以评估所提出的方法。结果表明,在不同的机器学习方法中,特洛伊木马可检测性显著。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Efficient Machine Learning Approach for Hardware Trojan Detection
As outsourcing of IC manufacturing has become a global phenomenon, the risk of ICs being infested with Trojans has increased more than ever. In this paper, we propose a circuit gate level netlist based Trojan detection using supervised machine learning approaches. A number of features are extracted from the netlist that delivers a sophisticated dataset for the approximately trained model to deliver a higher true positive detection rate. The netlist is analyzed in 45 nm technology to generate features and Monte Carlo simulation is performed to generate two thousand virtual netlists, including one thousand Trojan infested netlists. We experiment with the s27 benchmark circuit netlist to evaluate our approach. Different types of sequential and combinational types of Trojans from literature are inserted into the netlist to evaluate the proposed approach. The results show significant Trojan detectability in different machine learning approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信