Skip to main content
Log in

Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection

Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

Recently, the problem of hardware Trojan detection has gained a tangible significance in academia and industry. That problem, by its nature, is complex, time consuming and error prone due to design and fabrication outsourcing of hardware circuits to external untrusted foundries. Researchers have proposed different approaches, either destructive or non-destructive, to overcome that problem. The destructive approach depends on reverse engineering via decapsulation, delayering and layout identification. This paper presents a first trial of a new approach that can afford an automatic and robust solution for the step of layout identification. The proposed technique takes the underlying digital circuit as input, and automatically determines its basic features using Haar feature extractor. Based on that features, a decision tree is trained to act as a weak classifier, which is later boosted, by making use of AdaBoost learning algorithm, to produce a strong classifier in a chain of cascaded classifiers. Accordingly, a classification model is built up to provide an automatic hardware Trojan location and detection tool. To evaluate the proposed model, ISCAS89 benchmark dataset was used for training and testing. The hardware dataset has been altered deliberately to show different Trojan examples –namely, Trojan insertion, Trojan deletion and Trojan parametric- inside hardware circuits. By investigating the underlying experimental results, the capabilities of the proposed model are evaluated, and the evaluation shows that the approach can detect different hardware Trojan types in different circuit layouts, with high accuracy rate. The proposed approach is not only automatic, but also robust and promising.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. Agrawal D, Baktir S (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE Symposium on Security and Privacy, pp. 296–310

  2. Banga M, Chandrasekar M, Fang L, and Hsiao MS (2008) Guided test generation for isolation and detection of embedded trojans in ics. In: Proc. of the 18th ACM Great Lakes symposium on VLSI, pp. 363–366

  3. Bao C, Forte D, and Srivastava A (2014) On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: Proc. 15th IEEE International Symp. on Quality Electronic Design (ISQED), pp. 47–54

  4. Baumgarten A, Steffen M, Clausman M, Zambreno J (2011) A case study in hardware Trojan design and implementation. Int J Inf Secur 10(1):1–14

    Article  Google Scholar 

  5. Brglez F, Bryan D, and Koźmi’nski K (1989) Combinational profiles of sequential benchmark circuits. In: Proc. IEEE International Symposium on Circuits and Systems, pp. 1929–1934

  6. Freund Y, Schapire R, Abe N (1999) A short introduction to boosting. J-Japan Soc Artif Intell 14(771–780):1612

    Google Scholar 

  7. Han J, and Kamber M (2006) Data mining: concepts and techniques. The Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann Publishers

  8. Iba W, Langley P (1992) Induction of one-level decision trees. In: Proc. of the ninth international conference on machine learning, pp. 233–240

  9. ISCAS’89 Benchmark Circuits. [Online]. Available: http://www.pld.ttu.ee/~maksim/benchmarks/iscas89/verilog/. [Accessed: 03 Jul 2015]

  10. Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE International Conf. on Hardware-Oriented Security and Trust (HOST), pp. 51–57

  11. JinY, Kupp N, and Makris Y (2009) Experiences in hardware Trojan design and implementation. In: Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 50–57

  12. Lienhart R, Maydt J (2002) An extended set of haar-like features for rapid object detection. In: Proc. International Conference on Image Processing, pp. I–900

  13. Lo C, Chow P (2012) A high-performance architecture for training viola-jones object detectors. In: Proc. International Conference on Field-Programmable Technology (FPT), pp. 174–181

  14. Mitra S, Wong H-SP, Wong S (2015) The Trojan-proof chip. IEEE Spectr 52(2):46–51

    Article  Google Scholar 

  15. Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff F, Papachristou C, Roy K, and Bhunia S (2010) Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach. In: Proc. International Symp. on Hardware-Oriented Security and Trust (HOST), pp. 13–18

  16. OpenCV (Open Source Computer Vision Library). [Online]. Available: http://opencv.org/. [Accessed: 04 Jul 2015]

  17. Papageorgiou CP, Oren M, and Poggio T (1998) A general framework for object detection. In: Proc. Sixth International Conference on Computer Vision, pp. 555–562

  18. Salmani H, Tehranipoor M, and Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 66–73

  19. Shiyanovskii Y, Wolff F, Rajendran A, Papachristou C, Weyer D, and Clay W (2010) Process reliability based trojans through NBTI and HCI effects. In: Proc. NASA/ESA Conf. on Adaptive Hardware and Systems (AHS), pp. 215–222

  20. Subramanyan P, Tsiskaridze N, Pasricha K, Reisman D, Susnea A, and Malik S (2013) Reverse engineering digital circuits using functional analysis. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1277–1280

  21. Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Des Test Comput (27)1:10–25

  22. Tehranipoor M, Salmani H, and Zhang X (2013) Integrated circuit authentication. Springer

  23. Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media

  24. Torrance R, James D (2006) The state-of-the-art in IC reverse engineering. In: Cryptographic Hardware and Embedded Systems Springer, pp. 363–381

  25. Viola P, JonesM (2001) Rapid object detection using a boosted cascade of simple features. In: Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, pp. I–511

  26. Wang X, Narasimhan S, Krishna A, Mal-Sarkar T, and Bhunia S (2011) Sequential hardware Trojan: Side-channel aware design and placement. In: Proc. IEEE International Conf. on Computer Design (ICCD), pp. 297–300

  27. Wang X, Salmani H, Tehranipoor M, and Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE International Symp. on Defect and Fault Tolerance of VLSI Systems, pp. 87–95

  28. Wei S, Potkonjak M (2012) Scalable hardware Trojan diagnosis. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(6):1049–1057

    Article  Google Scholar 

  29. Wolff F, Papachristou C, Bhunia S, and Chakraborty RS (2008) Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: Proceedings of the conference on Design, automation and test in Europe, pp. 1362–1365.

  30. Xilinx ISE Synthesis and Simulation Design Guide. [Online]. Available: http://www.xilinx.com/support/documentation/sw_manuals/xilinx11/sim.pdf. [Accessed: 11 Mar 2016]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdurrahman A. Nasr.

Additional information

Responsible Editor: C. A. Papachristou

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nasr, A.A., Abdulmageed, M.Z. Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection. J Electron Test 32, 357–367 (2016). https://doi.org/10.1007/s10836-016-5581-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-016-5581-5

Keywords

Navigation