首页> 外文期刊>Journal of Electronic Testing: Theory and Applications: Theory and Applications >Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection
【24h】

Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection

机译:硬件布局的自动特征选择:迈向可靠的硬件木马检测的一步

获取原文
获取原文并翻译 | 示例
           

摘要

Recently, the problem of hardware Trojan detection has gained a tangible significance in academia and industry. That problem, by its nature, is complex, time consuming and error prone due to design and fabrication outsourcing of hardware circuits to external untrusted foundries. Researchers have proposed different approaches, either destructive or non-destructive, to overcome that problem. The destructive approach depends on reverse engineering via decapsulation, delayering and layout identification. This paper presents a first trial of a new approach that can afford an automatic and robust solution for the step of layout identification. The proposed technique takes the underlying digital circuit as input, and automatically determines its basic features using Haar feature extractor. Based on that features, a decision tree is trained to act as a weak classifier, which is later boosted, by making use of AdaBoost learning algorithm, to produce a strong classifier in a chain of cascaded classifiers. Accordingly, a classification model is built up to provide an automatic hardware Trojan location and detection tool. To evaluate the proposed model, ISCAS89 benchmark dataset was used for training and testing. The hardware dataset has been altered deliberately to show different Trojan examples -namely, Trojan insertion, Trojan deletion and Trojan parametric- inside hardware circuits. By investigating the underlying experimental results, the capabilities of the proposed model are evaluated, and the evaluation shows that the approach can detect different hardware Trojan types in different circuit layouts, with high accuracy rate. The proposed approach is not only automatic, but also robust and promising.
机译:近年来,硬件木马检测问题在学术界和工业界已具有明显的意义。该问题从本质上讲是复杂的,耗时的并且容易出错,这是由于将硬件电路的设计和制造外包给外部不受信任的代工厂的原因。研究人员提出了破坏性或非破坏性的不同方法来克服该问题。破坏性方法依赖于通过解封装,延迟和布局识别进行逆向工程。本文介绍了一种新方法的首次试用,该方法可以为布局识别步骤提供自动而可靠的解决方案。所提出的技术将基础数字电路作为输入,并使用Haar特征提取器自动确定其基本特征。基于该功能,训练决策树以充当弱分类器,然后通过使用AdaBoost学习算法对其进行增强,以在级联分类器链中产生强分类器。因此,建立了一个分类模型以提供自动的硬件木马定位和检测工具。为了评估建议的模型,将ISCAS89基准数据集用于培训和测试。故意更改了硬件数据集,以显示硬件电路内部不同的Trojan示例-即Trojan插入,Trojan删除和Trojan参数化。通过研究潜在的实验结果,对所提出模型的功能进行了评估,评估结果表明该方法可以在不同电路布局中检测出不同的硬件特洛伊木马类型,并且具有较高的准确率。所提出的方法不仅是自动的,而且是健壮且有希望的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号