Loading…

Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis

The 21 st century has been characterized by incredible technological advancements. A key factor of this revolution is the ever-growing circuits complexity that are the core components of all electronic devices. This revolution has resulted in the development of today's computers but has also le...

Full description

Saved in:
Bibliographic Details
Main Authors: Liakos, Konstantinos G, Georgakilas, Georgios K, Plessas, Fotis C
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 417
container_issue
container_start_page 412
container_title
container_volume
creator Liakos, Konstantinos G
Georgakilas, Georgios K
Plessas, Fotis C
description The 21 st century has been characterized by incredible technological advancements. A key factor of this revolution is the ever-growing circuits complexity that are the core components of all electronic devices. This revolution has resulted in the development of today's computers but has also led to the creation of a new generation of device viruses, called hardware trojans (HTs). HTs can infect circuits leading to their degradation, complete destruction, or leakage of encrypted information. HTs can be inserted into any phase of the circuit production chain, they can function silently and remain undetected until triggered by a predefined mechanism to deliver their payload. In this paper, we propose a HT classification method, named hArdware Trojan Learning AnalysiS (ATLAS), that identifies HT-infected circuits using a Gradient Boosting (GB) model on data from the gate-level netlist (GLN) phase. Our method was trained on 11 GLN features extracted from 18 trojan-free (TF) and 885 trojaninfected (TI) circuits deposited in Trust-HUB using industrialgrade design tool. The performance evaluation results demonstrate that ATLAS outperforms existing algorithms in terms of Precision, Sensitivity, and F1 measures, enabling highly accurate classification between TF and TI circuits.
doi_str_mv 10.1109/ISVLSI51109.2021.00081
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9516784</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9516784</ieee_id><sourcerecordid>9516784</sourcerecordid><originalsourceid>FETCH-LOGICAL-i199t-17a762ae1abf07d0ab2204f1b40fe56ed2447085c00441908da8cac6c4b40d713</originalsourceid><addsrcrecordid>eNotjG1LwzAURqMguE1_gSD5A533pmnSfBxDt0F9gU2_jtvmdmbUTpLi2L9X0U_PgXN4hLhFmCKCu1ut36r1qvjlqQKFUwAo8UyM0ZhC504bey5GCguX5draSzFOaQ-Ql6jVSOyWFP2RIstNPOypl_OOUgptaGgIh17SIBc0cNbxF3fyiYcupCHJmhJ7-eNnkUlS7-XL4chRPlLzHnqWFVPsQ7-Ts566UwrpSly01CW-_t-JeH2438yXWfW8WM1nVRbQuSFDS9YoYqS6BeuBaqVAt1hraLkw7JXWFsqiAdAaHZSeyoYa0-ifwlvMJ-Lm7zcw8_Yzhg-Kp60r0NhS599zdle1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis</title><source>IEEE Xplore All Conference Series</source><creator>Liakos, Konstantinos G ; Georgakilas, Georgios K ; Plessas, Fotis C</creator><creatorcontrib>Liakos, Konstantinos G ; Georgakilas, Georgios K ; Plessas, Fotis C</creatorcontrib><description>The 21 st century has been characterized by incredible technological advancements. A key factor of this revolution is the ever-growing circuits complexity that are the core components of all electronic devices. This revolution has resulted in the development of today's computers but has also led to the creation of a new generation of device viruses, called hardware trojans (HTs). HTs can infect circuits leading to their degradation, complete destruction, or leakage of encrypted information. HTs can be inserted into any phase of the circuit production chain, they can function silently and remain undetected until triggered by a predefined mechanism to deliver their payload. In this paper, we propose a HT classification method, named hArdware Trojan Learning AnalysiS (ATLAS), that identifies HT-infected circuits using a Gradient Boosting (GB) model on data from the gate-level netlist (GLN) phase. Our method was trained on 11 GLN features extracted from 18 trojan-free (TF) and 885 trojaninfected (TI) circuits deposited in Trust-HUB using industrialgrade design tool. The performance evaluation results demonstrate that ATLAS outperforms existing algorithms in terms of Precision, Sensitivity, and F1 measures, enabling highly accurate classification between TF and TI circuits.</description><identifier>EISSN: 2159-3477</identifier><identifier>EISBN: 1665439467</identifier><identifier>EISBN: 9781665439466</identifier><identifier>DOI: 10.1109/ISVLSI51109.2021.00081</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>application specific integrated circuit ; classification ; Design tools ; Feature extraction ; gate-level netlists ; Hardware ; hardware trojan ; industrial design tool ; Logic gates ; machine learning ; Production ; Sensitivity ; Training</subject><ispartof>2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021, p.412-417</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9516784$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9516784$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liakos, Konstantinos G</creatorcontrib><creatorcontrib>Georgakilas, Georgios K</creatorcontrib><creatorcontrib>Plessas, Fotis C</creatorcontrib><title>Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis</title><title>2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</title><addtitle>ISVLSI</addtitle><description>The 21 st century has been characterized by incredible technological advancements. A key factor of this revolution is the ever-growing circuits complexity that are the core components of all electronic devices. This revolution has resulted in the development of today's computers but has also led to the creation of a new generation of device viruses, called hardware trojans (HTs). HTs can infect circuits leading to their degradation, complete destruction, or leakage of encrypted information. HTs can be inserted into any phase of the circuit production chain, they can function silently and remain undetected until triggered by a predefined mechanism to deliver their payload. In this paper, we propose a HT classification method, named hArdware Trojan Learning AnalysiS (ATLAS), that identifies HT-infected circuits using a Gradient Boosting (GB) model on data from the gate-level netlist (GLN) phase. Our method was trained on 11 GLN features extracted from 18 trojan-free (TF) and 885 trojaninfected (TI) circuits deposited in Trust-HUB using industrialgrade design tool. The performance evaluation results demonstrate that ATLAS outperforms existing algorithms in terms of Precision, Sensitivity, and F1 measures, enabling highly accurate classification between TF and TI circuits.</description><subject>application specific integrated circuit</subject><subject>classification</subject><subject>Design tools</subject><subject>Feature extraction</subject><subject>gate-level netlists</subject><subject>Hardware</subject><subject>hardware trojan</subject><subject>industrial design tool</subject><subject>Logic gates</subject><subject>machine learning</subject><subject>Production</subject><subject>Sensitivity</subject><subject>Training</subject><issn>2159-3477</issn><isbn>1665439467</isbn><isbn>9781665439466</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjG1LwzAURqMguE1_gSD5A533pmnSfBxDt0F9gU2_jtvmdmbUTpLi2L9X0U_PgXN4hLhFmCKCu1ut36r1qvjlqQKFUwAo8UyM0ZhC504bey5GCguX5draSzFOaQ-Ql6jVSOyWFP2RIstNPOypl_OOUgptaGgIh17SIBc0cNbxF3fyiYcupCHJmhJ7-eNnkUlS7-XL4chRPlLzHnqWFVPsQ7-Ts566UwrpSly01CW-_t-JeH2438yXWfW8WM1nVRbQuSFDS9YoYqS6BeuBaqVAt1hraLkw7JXWFsqiAdAaHZSeyoYa0-ifwlvMJ-Lm7zcw8_Yzhg-Kp60r0NhS599zdle1</recordid><startdate>202107</startdate><enddate>202107</enddate><creator>Liakos, Konstantinos G</creator><creator>Georgakilas, Georgios K</creator><creator>Plessas, Fotis C</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202107</creationdate><title>Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis</title><author>Liakos, Konstantinos G ; Georgakilas, Georgios K ; Plessas, Fotis C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i199t-17a762ae1abf07d0ab2204f1b40fe56ed2447085c00441908da8cac6c4b40d713</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>application specific integrated circuit</topic><topic>classification</topic><topic>Design tools</topic><topic>Feature extraction</topic><topic>gate-level netlists</topic><topic>Hardware</topic><topic>hardware trojan</topic><topic>industrial design tool</topic><topic>Logic gates</topic><topic>machine learning</topic><topic>Production</topic><topic>Sensitivity</topic><topic>Training</topic><toplevel>online_resources</toplevel><creatorcontrib>Liakos, Konstantinos G</creatorcontrib><creatorcontrib>Georgakilas, Georgios K</creatorcontrib><creatorcontrib>Plessas, Fotis C</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liakos, Konstantinos G</au><au>Georgakilas, Georgios K</au><au>Plessas, Fotis C</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis</atitle><btitle>2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</btitle><stitle>ISVLSI</stitle><date>2021-07</date><risdate>2021</risdate><spage>412</spage><epage>417</epage><pages>412-417</pages><eissn>2159-3477</eissn><eisbn>1665439467</eisbn><eisbn>9781665439466</eisbn><coden>IEEPAD</coden><abstract>The 21 st century has been characterized by incredible technological advancements. A key factor of this revolution is the ever-growing circuits complexity that are the core components of all electronic devices. This revolution has resulted in the development of today's computers but has also led to the creation of a new generation of device viruses, called hardware trojans (HTs). HTs can infect circuits leading to their degradation, complete destruction, or leakage of encrypted information. HTs can be inserted into any phase of the circuit production chain, they can function silently and remain undetected until triggered by a predefined mechanism to deliver their payload. In this paper, we propose a HT classification method, named hArdware Trojan Learning AnalysiS (ATLAS), that identifies HT-infected circuits using a Gradient Boosting (GB) model on data from the gate-level netlist (GLN) phase. Our method was trained on 11 GLN features extracted from 18 trojan-free (TF) and 885 trojaninfected (TI) circuits deposited in Trust-HUB using industrialgrade design tool. The performance evaluation results demonstrate that ATLAS outperforms existing algorithms in terms of Precision, Sensitivity, and F1 measures, enabling highly accurate classification between TF and TI circuits.</abstract><pub>IEEE</pub><doi>10.1109/ISVLSI51109.2021.00081</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2159-3477
ispartof 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021, p.412-417
issn 2159-3477
language eng
recordid cdi_ieee_primary_9516784
source IEEE Xplore All Conference Series
subjects application specific integrated circuit
classification
Design tools
Feature extraction
gate-level netlists
Hardware
hardware trojan
industrial design tool
Logic gates
machine learning
Production
Sensitivity
Training
title Hardware Trojan Classification at Gate-level Netlists based on Area and Power Machine Learning Analysis
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T20%3A21%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hardware%20Trojan%20Classification%20at%20Gate-level%20Netlists%20based%20on%20Area%20and%20Power%20Machine%20Learning%20Analysis&rft.btitle=2021%20IEEE%20Computer%20Society%20Annual%20Symposium%20on%20VLSI%20(ISVLSI)&rft.au=Liakos,%20Konstantinos%20G&rft.date=2021-07&rft.spage=412&rft.epage=417&rft.pages=412-417&rft.eissn=2159-3477&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ISVLSI51109.2021.00081&rft.eisbn=1665439467&rft.eisbn_list=9781665439466&rft_dat=%3Cieee_CHZPO%3E9516784%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i199t-17a762ae1abf07d0ab2204f1b40fe56ed2447085c00441908da8cac6c4b40d713%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9516784&rfr_iscdi=true