World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

Identification of Hardware Trojan in Gate-Level Netlist

    https://doi.org/10.1142/S0218126624300058Cited by:0 (Source: Crossref)

    Hardware Trojans (HT) are tiny, malicious circuits intentionally designed by an adversary. The existing works found in the literature on gate-level netlists are mainly based on supervised classification with few attempts at unsupervised clustering. However, the over-reliance on pre-defined structural features used in these supervised classification methods makes them vulnerable to the new Trojan attacks, whereas most unsupervised methods ignore this feature completely. This work presents an unsupervised approach for HT net detection based on the structural features required for small rare-event triggered HTs irrespective of the payload. The proposed work uses k-means clustering on these features to reduce the search space. A new metric based on combinational controllability is applied next to detect the possible trigger net. Experimental results of fifteen selected Trust-HUB benchmarks show the capability of the proposed technique against different types of HT triggers. Results show that the proposed approach reduces the search space massively (up to 99%) while running within a reasonable time frame.

    This paper was recommended by Regional Editor Tongquan Wei.