Skip to main content

Hardware Trojan Detection Using Deep Learning Technique

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 898))

Abstract

A method to detect hardware Trojan in gate-level netlist is proposed using deep learning technique. The paper shows that it is easy to identify genuine nodes and Trojan-infected nodes based on controllability and transition probability values of a given Trojan-infected circuit. The controllability and transition probability characteristics of Trojan-infected nodes show large inter-cluster distance from the genuine nodes so that it is easy to cluster the nodes as Trojan-infected nodes and genuine nodes. From a given circuit, controllability and transition probability values are extracted as Trojan features using deep learning algorithm and clustering the data using k-means clustering. The technique is validated on ISCAS’85 benchmark circuits, and it does not require any golden model as reference. The proposed method can detect all Trojan-infected nodes in less than 6 s with zero false positive and zero false negative detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. In: IEEE Design & Test of Computers, pp. 10–25 (2010)

    Google Scholar 

  2. Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards trojan-free trusted ICs: problem analysis and detection scheme. In: Design, Automation and Test in Europe, pp. 1362–1365 (2008)

    Google Scholar 

  3. Dubeuf, J., Hely, D., Karri, R.: Run-time detection of hardware trojans: the processor protection unit. In: IEEE European Test Symposium, ETS, pp. 1–6 (2013)

    Google Scholar 

  4. Chakraborty, R.S., Pagliarini, S., Mathew, J., Sree Ranjani, R., Nirmala Devi, M.: A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans. Emerg. Topics Comput. (2017)

    Google Scholar 

  5. Banga, M., Hsiao, M.: A region based approach for the identification of hardware trojans. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 40–47 (2010)

    Google Scholar 

  6. Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(9), 1845–1853 (2014)

    Article  Google Scholar 

  7. Tehranipoor, M.: A survey of hardware trojan taxonomy and detection. In: IEEE Design, Test of Computers (2010)

    Google Scholar 

  8. Mohankumar, N., Periasamy, R., Sivaraj, P., Thakur, A.: Hardware trojan detection-a survey. In: 4th National Conference on Recent Trends in Communication Computation and Signal Processing (RTCSP-2013), pp. 99–102 (2013)

    Google Scholar 

  9. Kamran Haider, S., Jin, C., Ahmad, M., Manikantan Shila, D.: Hardware trojan: Threats and Emerging Solutions. ePrint Arch., Tech. Rep. (2009)

    Google Scholar 

  10. Popat, J., Mehta, U.: Transition probabilistic approach for detection and diagnosis hardware trojan in combinational circuits. In: IEEE (2016)

    Google Scholar 

  11. Salmani, H.: COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12 (2017)

    Article  Google Scholar 

  12. Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Hardware trojans classification for gate-level netlists based on machine learning. In: Proceedings of the IEEE/ACM International Conference (2016)

    Google Scholar 

  13. Hasegawa, K., Yanagisawa, M., Togawa, N.: Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: IEEE (2017)

    Google Scholar 

  14. Hasegawa, K., Yanagisawa, M., Togawa, N.: Hardware trojans classification for gate-level netlists using multi-layer neural networks. In: IEEE (2017)

    Google Scholar 

  15. LeCun, Y., Bengio, Y., Hinton, G.: Deep Learning. Macmillan Publishers Limited (2015)

    Google Scholar 

  16. Introduction to Deep Learning. http://introtodeeplearning.com

  17. Synopsys TetraMAX. http://www.synopsys.com/Tools/Pages/default.aspx

  18. Dive Into Python. http://diveintopython.org. O’Reilly, Associates

  19. Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Controllability and observability. In: Proceedings of the IEEE/ACM International Conference (2016)

    Google Scholar 

  20. Bushnell, M., Agrawal, V.: Essentials of Electronic Testing. Springer, Berlin (2015)

    Google Scholar 

  21. Autoencoder. http://ufldl.stanford.edu/tutorial/unsupervised/Autoencoders/

  22. Autoencoder. https://github.com/Rentier/keras-autoen-coder

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Reshma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Reshma, K., Priyatharishini, M., Nirmala Devi, M. (2019). Hardware Trojan Detection Using Deep Learning Technique. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 898. Springer, Singapore. https://doi.org/10.1007/978-981-13-3393-4_68

Download citation

Publish with us

Policies and ethics