Abstract
Recently, hardware Trojan has become a major threat for integrated circuits. Most of the existing hardware Trojan detection works require golden chips or golden models for reference. However, a golden chip is extremely difficult to obtain or even does not exist. In this paper, we propose a novel hardware Trojan detection technique using unsupervised clustering techniques. The unsupervised clustering technique can obtain the structure information of the set of unlabeled ICs, and then distinguishes the suspicious ICs from the ICs under test. We formulate the unsupervised hardware Trojan detection problem into two types of detection models: partitioning-based and density-based detection model. We also propose a novel metric to determine the labels of the clusters. Compared with the state-of-the-art detection methods, the proposed technique can work in an unsupervised scenario with no need of ICs’ prior information. It does not require fabricated golden chips or golden models. We perform simulation evaluation on ISCAS89 benchmarks and FPGA evaluation on Trust-HUB benchmarks. Both evaluation results show that the proposed technique can detect infected ICs in the unsupervised scenario with a good accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396–410. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04138-9_28
Xue, M., Hu, A., Huang, Y., Li, G.: Monte Carlo based test pattern generation for hardware Trojan detection. In: IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 131–136 (2013)
Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1792–1805 (2014)
Xue, M., Liu, W., Hu, A., Wang, Y.: Detecting hardware Trojan through time domain constrained estimator based unified subspace technique. IEICE Trans. Inf. Syst. 97(3), 606–609 (2014)
Xue, M., Hu, A., Li, G.: Detecting hardware Trojan through heuristic partition and activity driven test pattern generation. In: Communications Security Conference (CSC), pp. 1–6. IET (2014)
Xiao, K., Forte, D., Tehranipoor, M.: A novel built-in self-authentication technique to prevent inserting hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1778–1791 (2014)
Xue, M., Wang, J., Wang, Y., Hu, A.: Security against hardware Trojan attacks through a novel Chaos FSM and delay chains array PUF based design obfuscation scheme. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 14–24. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_2
Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 35(1), 49–57 (2016)
Kulkarni, A., Pino, Y., Mohsenin, T.: Adaptive real-time Trojan detection framework through machine learning. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 120–123 (2016)
Xue, M., Wang, J., Hu, A.: An enhanced classification-based golden chips-free hardware Trojan detection technique. In: IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1–6 (2016)
Çakir, B., Malik, S.: Hardware Trojan detection for gate-level ICs using signal correlation based clustering. In: Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 471–476 (2015)
Salmani, H.: COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12(2), 338–350 (2017)
Ba, P.S., Dupuis, S., Flottes, M.L., Natale, G.D., Rouzeyre, B.: Using outliers to detect stealthy hardware Trojan triggering?. In: IEEE International Verification and Security Workshop, pp. 1–6 (2016)
Zepeda-Mendoza, M.L., Resendis-Antonio, O.: Hierarchical agglomerative clustering. In: Encyclopedia of Systems Biology. pp. 886–887. Springer, New York (2013)
Ester, M., Kriegel, H.P., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference on Knowledge Discovery and Data Mining, pp. 226–231. AAAI Press (1996)
Ngo, X.T., Najm, Z., Bhasin, S., Guilley, S., Danger, J.L.: Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6(3), 239–247 (2016)
Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-662-04722-4
Trust-HUB. http://www.trust-hub.org/
Reece, T., Robinson, W.H.: Analysis of data-leak hardware Trojans in AES cryptographic circuits. In: IEEE International Conference on Technologies for Homeland Security (HST), pp. 467–472 (2013)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (No. 61602241), the Natural Science Foundation of Jiangsu Province (No. BK20150758), the CCF-Venustech Hongyan Research Plan (No. CCF-VenustechRP2016005), the CCF-NSFocus Kunpeng Foundation (No. CCF-NSFocus2017003), the Postdoctoral Science Foundation of China (No. 2014M561644), the Postdoctoral Science Foundation of Jiangsu Province (No. 1402034C), and the Fundamental Research Funds for the Central Universities (No. NS2016096).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Bian, R., Xue, M., Wang, J. (2018). A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-00015-8_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00014-1
Online ISBN: 978-3-030-00015-8
eBook Packages: Computer ScienceComputer Science (R0)