Skip to main content

A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune Systems

  • Chapter
  • First Online:
Behavioral Synthesis for Hardware Security
  • 623 Accesses

Abstract

Security assurance in a computer system can be viewed as distinguishing between self and non-self; such is the view of Artificial Immune Systems (AIS), which are a class of Machine Learning (ML) algorithms, inspired by innate behavior of biological immune systems that have evolved over generations to accurately classify self-behavior from non-self-behavior to fight diseases. This chapter describes a technique leveraging AIS-based ML techniques and the associated software tool used to identify behavioral traits in high-level hardware descriptions for classifying unsafe or undesirable behaviors. Such behaviors include those caused by human error during development, or intentional, malicious circuit modifications, known as hardware Trojans, without the need for a golden reference model. Negative Selection and Clonal Selection Algorithms, which have historically been applied to malware detection on software binaries to detect potentially unsafe or malicious behavior, are applied to analyze hardware control and data-flow graphs (CDFGs) of Trojan-inserted benchmarks to train an AIS behavior model, against which novel hardware descriptions may be tested. This model efficiently detects specified (Trojan or Trojan-like) behavior with an accuracy of 86.3% and an average false negative rate of 12.6% for Negative Selection and 12.8% for Clonal Selection.***

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: High Level Design Validation and Test Workshop, 2009. HLDVT 2009. IEEE International, pp. 166–171. IEEE, New York (2009)

    Google Scholar 

  2. Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)

    Article  Google Scholar 

  3. Narasimhan, S., Wang, X., Du, D., Chakraborty, R.S., Bhunia, S.: TeSR: a robust temporal self-referencing approach for hardware Trojan detection. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 71–74. IEEE, New York (2011)

    Google Scholar 

  4. Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Cryptographic Hardware and Embedded Systems-CHES 2009, pp. 396–410. Springer, New York (2009)

    Google Scholar 

  5. Zhang, X., Tehranipoor, M.: Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 67–70. IEEE, New York (2011)

    Google Scholar 

  6. Fern, N., Cheng, K.T.T.: Detecting hardware Trojans in unspecified functionality using mutation testing. In: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, pp. 560–566. IEEE Press, New York (2015)

    Google Scholar 

  7. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994. Proceedings, pp. 202–212. IEEE, New York (1994)

    Google Scholar 

  8. Kephart, J.O., et al.: A biologically inspired immune system for computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pp. 130–139 (1994)

    Google Scholar 

  9. Zhang, P.T., Wang, W., Tan, Y.: A malware detection model based on a negative selection algorithm with penalty factor. Sci. China Inf. Sci. 53(12), 2461–2471 (2010)

    Article  Google Scholar 

  10. Al Daoud, E.: Metamorphic viruses detection using artificial immune system. In: International Conference on Communication Software and Networks, 2009, ICCSN’09, pp. 168–172. IEEE, New York (2009)

    Google Scholar 

  11. Guo, Z., Liu, Z., Tan, Y.: An NN-based malicious executables detection algorithm based on immune principles. In: International Symposium on Neural Networks, pp. 675–680. Springer, New York (2004)

    Google Scholar 

  12. Al-Sheshtawi, K.A., Abdul-Kader, H.M., Ismail, N.A.: Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences. Int. J. Comput. Sci. Netw. Secur. 10(4), 31–39 (2010)

    Google Scholar 

  13. De Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Trans. Evolut. Comput. 6(3), 239–251 (2002)

    Article  Google Scholar 

  14. Tan, K.C., Goh, C.K., Mamun, A.A., Ei, E.Z.: An evolutionary artificial immune system for multi-objective optimization. Eur. J. Oper. Res. 187(2), 371–392 (2008)

    Article  MathSciNet  Google Scholar 

  15. De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: Proceedings of GECCO, vol. 2000, pp. 36–39 (2000)

    Google Scholar 

  16. Salmani, H., Tehranipoor, M., Karri, R.: On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471–474. IEEE, New York (2013)

    Google Scholar 

  17. Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., Tehranipoor, M.: Benchmarking of hardware Trojans and maliciously affected circuits. J. Hardware Syst. Secur. 1(1), 85–102 (2017)

    Article  Google Scholar 

  18. Takamaeda-Yamazaki, S.: Python-based hardware design processing toolkit for verilog HDL. In: International Symposium on Applied Reconfigurable Computing, pp. 451–460. Springer, New York (2015)

    Google Scholar 

  19. Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2008. HOST 2008, pp. 15–19. IEEE, New York (2008)

    Google Scholar 

  20. Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)

    Article  Google Scholar 

  21. Li, H., Liu, Q., Zhang, J.: A survey of hardware Trojan threat and defense. Integr. VLSI J. 55, 426–437 (2016)

    Article  Google Scholar 

  22. Bhunia, S., Tehranipoor, M.M.: The Hardware Trojan War: Attacks, Myths, and Defenses. Springer, New York (2017)

    Google Scholar 

  23. Jha, S., Jha, S.K.: Randomization based probabilistic approach to detect Trojan circuits. In: Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium, HASE ’08, p. 117–124. IEEE Computer Society, New York (2008). https://doi.org/10.1109/HASE.2008.37

  24. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP ’07, p. 296–310. IEEE Computer Society, New York (2007). https://doi.org/10.1109/SP.2007.36

  25. Bloom, G., Narahari, B., Simha, R.: OS support for detecting Trojan circuit attacks. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 100–103 (2009)

    Google Scholar 

  26. Banga, M., Hsiao, M.S.: A novel sustained vector technique for the detection of hardware Trojans. In: 2009 22nd International Conference on VLSI Design, pp. 327–332. IEEE, New York (2009)

    Google Scholar 

  27. Iwase, T., Nozaki, Y., Yoshikawa, M., Kumaki, T.: Detection technique for hardware Trojans using machine learning in frequency domain. In: 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp. 185–186. IEEE, New York (2015)

    Google Scholar 

  28. Lodhi, F.K., Abbasi, I., Khalid, F., Hasan, O., Awwad, F., Hasan, S.R.: A self-learning framework to detect the intruded integrated circuits. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1702–1705. IEEE, New York (2016)

    Google Scholar 

  29. Bao, C., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: 2014 15th International Symposium on Quality Electronic Design (ISQED), pp. 47–54. IEEE, New York (2014)

    Google Scholar 

  30. Hasegawa, K., Oya, M., Yanagisawa, M., Togawa, N.: Hardware Trojans classification for gate-level netlists based on machine learning. In: 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 203–206. IEEE, New York (2016)

    Google Scholar 

  31. Oya, M., Shi, Y., Yanagisawa, M., Togawa, N.: A score-based classification method for identifying hardware-Trojans at gate-level netlists. In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, EDA Consortium, pp. 465–470 (2015)

    Google Scholar 

  32. Waksman, A., Suozzo, M., Sethumadhavan, S.: FANCI: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, pp. 697–708. ACM, New York (2013)

    Google Scholar 

  33. Zhang, J., Yuan, F., Wei, L., Liu, Y., Xu, Q.: VeriTrust: verification for hardware trust. IEEE Trans. Comput.-Aid. Des. Integr. Circ. Syst. 34(7), 1148–1161 (2015)

    Article  Google Scholar 

  34. Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)

    Article  Google Scholar 

  35. Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K., Watson, J.: Molecular Biology of the Cell, 4th edn. Garland, New York (2002)

    Google Scholar 

  36. Murphy, K., Weaver, C.: Janeway’s Immunobiology. Garland Science, New York (2016)

    Book  Google Scholar 

  37. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolut. Comput. 8(4), 443–473 (2000)

    Article  Google Scholar 

  38. Dasgupta, D., Yu, S., Nino, F.: Recent advances in artificial immune systems: models and applications. Appl. Soft Comput. 11(2), 1574–1587 (2011)

    Article  Google Scholar 

  39. Romagnani, S.: Immunological tolerance and autoimmunity. Intern. Emerg. Med. 1(3), 187–196 (2006)

    Article  Google Scholar 

  40. Owen, J.A., Punt, J., Stranford, S.A., et al.: Kuby Immunology. WH Freeman, New York (2013)

    Google Scholar 

  41. Zareen, F., Karam, R.: Detecting RTL Trojans using artificial immune systems and high level behavior classification. In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 68–73 (2018). https://doi.org/10.1109/AsianHOST.2018.8607172

    Google Scholar 

  42. Burnet, F.M., et al.: A modification of Jerne’s theory of antibody production using the concept of clonal selection. Austr. J. Sci. 20(3), 67–9 (1957)

    Google Scholar 

  43. Victora, G.D., Nussenzweig, M.C.: Germinal centers. Annu. Rev. Immunol. 30, 429–457 (2012)

    Article  Google Scholar 

  44. Weinand, R.G.: Somatic mutation, affinity maturation and the antibody repertoire: a computer model. J. Theoret. Biol. 143(3), 343–382 (1990)

    Article  Google Scholar 

  45. He, M.X., Petoukhov, S.V., Ricci, P.E.: Genetic code, hamming distance and stochastic matrices. Bull. Math. Biol. 66(5), 1405–1421 (2004)

    Article  MathSciNet  Google Scholar 

  46. Allen, F.E.: Control flow analysis. In: Proceedings of a Symposium on Compiler Optimization, pp. 1–19. ACM, New York (1970). http://doi.acm.org/10.1145/800028.808479

  47. Williamson, M.C., Lee, E.A.: Synthesis of parallel hardware implementations from synchronous dataflow graph specifications. In: Conference Record of the Thirtieth Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 1340–1343 (1996). https://doi.org/10.1109/ACSSC.1996.599166

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farhath Zareen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zareen, F., Karam, R. (2022). A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune Systems. In: Katkoori, S., Islam, S.A. (eds) Behavioral Synthesis for Hardware Security. Springer, Cham. https://doi.org/10.1007/978-3-030-78841-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78841-4_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78840-7

  • Online ISBN: 978-3-030-78841-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics