Threshold Analysis Using Probabilistic Xgboost Classifier for Hardware Trojan Detection

Springer Science and Business Media LLC - Tập 39 - Trang 447-463 - 2023
Tapobrata Dhar1, Ranit Das2, Chandan Giri1, Surajit Kumar Roy1
1Indian Institute of Engineering Science and Technology, Shibpur, Howrah, India
2Samsung Research Institute, Noida, India

Tóm tắt

The fabless nature of integrated circuits manufacturing leaves them vulnerable to modifications by ill-intentioned third party. There arises a necessity for security measures during their manufacturing to protect them from covert modifications known as hardware Trojans. Static analysis of gate-level synthesized integrated circuits can prove helpful in detecting the presence of unwanted circuitry within the host. This paper proposes a static analysis technique of gate-level integrated circuits using supervised probabilistic classifier through effective threshold analysis. New and existing relevant features are extracted that relates to hardware Trojan properties and normalised accordingly. Effective features are selected using their feature importance values. Variance threshold has been used to create a high entropy feature subset to train a supervised model using XGBoost algorithm with relevant hyperparameters. Threshold values of the probabilistic classifier are determined through analysis of threshold obtained using receiver operating characteristic and precision-recall curves. The chosen techniques showcase hardware Trojan detection with high accuracy over gate-level synthesized circuits.

Tài liệu tham khảo

Benesty J, Chen J, Huang Y, Cohen I (2009) Pearson correlation coefficient. In: Proc. Noise Reduction in Speech Processing. Springer Topics in Signal Processing, pp. 1–4. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00296-0_5 Brglez F, Bryan D, Kozminski K (1989) Combinational profiles of sequential benchmark circuits. In: Proc. 1989 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1929–19343. https://doi.org/10.1109/ISCAS.1989.100747 Chen T, Guestrin C (2016) XGBoost: A scalable tree boosting system. In: Proc. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’16, pp. 785–794. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2939672.2939785 Das R, Dhar T, Roy SK (2022) A threshold based hardware trojan detection technique using xgboost algorithm. In: Proc. 2022 IEEE International Test Conference India (ITC India), pp. 1–6. https://doi.org/10.1109/ITCIndia202255192.2022.9854735 Dhar T, Roy SK, Giri C (2021) Hardware Trojan Horse Detection through Improved Switching of Dormant Nets. ACM J Emerg Technol Comput Syst 17(3):33–13322. https://doi.org/10.1145/3439951 Dong C, Chen J, Guo W, Zou J (2019) A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things. Int J Distrib Sens Netw 15(12):1550147719888098 Dong C, Liu Y, Chen J, Liu X, Guo W, Chen Y (2020) An unsupervised detection approach for hardware trojans. IEEE Access: Practical Innovations, Open Solutions 8:158169–158183. https://doi.org/10.1109/ACCESS.2020.3001239 Goldstein LH, Thigpen EL (1980) SCOAP: Sandia Controllability/Observability analysis program. In: Proc. 17th Design Automation Conference, pp. 190–196. https://doi.org/10.1109/DAC.1980.1585245 Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: Proc. 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 203–206. https://doi.org/10.1109/IOLTS.2016.7604700 Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier. In: Proc. 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. https://doi.org/10.1109/ISCAS.2017.8050827 Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In: Proc. 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 227–232. https://doi.org/10.1109/IOLTS.2017.8046227 Hoque T, Cruz J, Chakraborty P, Bhunia S (2018) Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify. In: Proc. 2018 IEEE International Test Conference (ITC), pp. 1–10. https://doi.org/10.1109/TEST.2018.8624727 Huang Z, Wang Q, Chen Y, Jiang X (2020) A survey on machine learning against Hardware trojan attacks: Recent advances and challenges. IEEE Access 8:10796–10826. https://doi.org/10.1109/ACCESS.2020.2965016 Jacob N, Merli D, Heyszl J, Sigl G (2014) Hardware Trojans Current challenges and approaches. IET Comput Digit Tech 8(6):264–273. https://doi.org/10.1049/iet-cdt.2014.0039 Kok CH, Ooi CY, Moghbel M, Ismail N, Choo HS, Inoue M (2019) Classification of trojan nets based on SCOAP values using supervised learning. In: Proc. 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. https://doi.org/10.1109/ISCAS.2019.8702462 Li H, Liu Q, Zhang J, Lyu Y (2015) A survey of hardware trojan detection, diagnosis and prevention. In: Proc. 2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics), pp. 173–180. https://doi.org/10.1109/CADGRAPHICS.2015.41 Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. Proc IEEE 102(8):1283–1295. https://doi.org/10.1109/JPROC.2014.2335155 Sakia RM (1992) The box-cox transformation technique: A review. J R Stat Soc Ser A Stat Soc Series D 41(2):169–178 Salmani H, Tehranipoor M (2023) Trust-Hub.Org. https://trust-hub.org/#/home Sharma R, Valivati NK, Sharma GK, Pattanaik M (2020) A new hardware trojan detection technique using class weighted XGBoost classifier. In: Proc. 2020 24th International Symposium on VLSI Design and Test (VDAT), pp. 1–6. https://doi.org/10.1109/VDAT50263.2020.9190603 Tebyanian M, Mokhtarpour A, Shafieinejad A (2021) SC-COTD: Hardware trojan detection based on sequential/combinational testability features using ensemble classifier. J Electron Test 37(4):473–487. https://doi.org/10.1007/s10836-021-05960-2 Yang Y, Ye J, Cao Y, Zhang J, Li X, Li H, Hu Y (2020) Survey: Hardware trojan detection for netlist. In: Proc. 2020 IEEE 29th Asian Test Symposium (ATS), pp. 1–6. https://doi.org/10.1109/ATS49688.2020.9301614