Skip to main content

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Included in the following conference series:

Abstract

Recently, hardware Trojan has become a major threat for integrated circuits. Most of the existing hardware Trojan detection works require golden chips or golden models for reference. However, a golden chip is extremely difficult to obtain or even does not exist. In this paper, we propose a novel hardware Trojan detection technique using unsupervised clustering techniques. The unsupervised clustering technique can obtain the structure information of the set of unlabeled ICs, and then distinguishes the suspicious ICs from the ICs under test. We formulate the unsupervised hardware Trojan detection problem into two types of detection models: partitioning-based and density-based detection model. We also propose a novel metric to determine the labels of the clusters. Compared with the state-of-the-art detection methods, the proposed technique can work in an unsupervised scenario with no need of ICs’ prior information. It does not require fabricated golden chips or golden models. We perform simulation evaluation on ISCAS89 benchmarks and FPGA evaluation on Trust-HUB benchmarks. Both evaluation results show that the proposed technique can detect infected ICs in the unsupervised scenario with a good accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396–410. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04138-9_28

    Chapter  Google Scholar 

  2. Xue, M., Hu, A., Huang, Y., Li, G.: Monte Carlo based test pattern generation for hardware Trojan detection. In: IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 131–136 (2013)

    Google Scholar 

  3. Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1792–1805 (2014)

    Google Scholar 

  4. Xue, M., Liu, W., Hu, A., Wang, Y.: Detecting hardware Trojan through time domain constrained estimator based unified subspace technique. IEICE Trans. Inf. Syst. 97(3), 606–609 (2014)

    Article  Google Scholar 

  5. Xue, M., Hu, A., Li, G.: Detecting hardware Trojan through heuristic partition and activity driven test pattern generation. In: Communications Security Conference (CSC), pp. 1–6. IET (2014)

    Google Scholar 

  6. Xiao, K., Forte, D., Tehranipoor, M.: A novel built-in self-authentication technique to prevent inserting hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1778–1791 (2014)

    Google Scholar 

  7. Xue, M., Wang, J., Wang, Y., Hu, A.: Security against hardware Trojan attacks through a novel Chaos FSM and delay chains array PUF based design obfuscation scheme. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 14–24. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_2

    Chapter  Google Scholar 

  8. Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 35(1), 49–57 (2016)

    Article  Google Scholar 

  9. Kulkarni, A., Pino, Y., Mohsenin, T.: Adaptive real-time Trojan detection framework through machine learning. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 120–123 (2016)

    Google Scholar 

  10. Xue, M., Wang, J., Hu, A.: An enhanced classification-based golden chips-free hardware Trojan detection technique. In: IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1–6 (2016)

    Google Scholar 

  11. Çakir, B., Malik, S.: Hardware Trojan detection for gate-level ICs using signal correlation based clustering. In: Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 471–476 (2015)

    Google Scholar 

  12. Salmani, H.: COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12(2), 338–350 (2017)

    Article  Google Scholar 

  13. Ba, P.S., Dupuis, S., Flottes, M.L., Natale, G.D., Rouzeyre, B.: Using outliers to detect stealthy hardware Trojan triggering?. In: IEEE International Verification and Security Workshop, pp. 1–6 (2016)

    Google Scholar 

  14. Zepeda-Mendoza, M.L., Resendis-Antonio, O.: Hierarchical agglomerative clustering. In: Encyclopedia of Systems Biology. pp. 886–887. Springer, New York (2013)

    Google Scholar 

  15. Ester, M., Kriegel, H.P., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference on Knowledge Discovery and Data Mining, pp. 226–231. AAAI Press (1996)

    Google Scholar 

  16. Ngo, X.T., Najm, Z., Bhasin, S., Guilley, S., Danger, J.L.: Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6(3), 239–247 (2016)

    Article  Google Scholar 

  17. Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-662-04722-4

  18. Trust-HUB. http://www.trust-hub.org/

  19. Reece, T., Robinson, W.H.: Analysis of data-leak hardware Trojans in AES cryptographic circuits. In: IEEE International Conference on Technologies for Homeland Security (HST), pp. 467–472 (2013)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. 61602241), the Natural Science Foundation of Jiangsu Province (No. BK20150758), the CCF-Venustech Hongyan Research Plan (No. CCF-VenustechRP2016005), the CCF-NSFocus Kunpeng Foundation (No. CCF-NSFocus2017003), the Postdoctoral Science Foundation of China (No. 2014M561644), the Postdoctoral Science Foundation of Jiangsu Province (No. 1402034C), and the Fundamental Research Funds for the Central Universities (No. NS2016096).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingfu Xue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bian, R., Xue, M., Wang, J. (2018). A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics