AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (2.2 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

HTDet: A Clustering Method Using Information Entropy for Hardware Trojan Detection

University of Chinese Academy of Sciences, Beijing 101408, China.
Beijing Institute of Computer Technology and Application, Beijing 100854, China.
State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China.
Show Author Information

Abstract

Hardware Trojans (HTs) have drawn increasing attention in both academia and industry because of their significant potential threat. In this paper, we propose HTDet, a novel HT detection method using information entropy-based clustering. To maintain high concealment, HTs are usually inserted in the regions with low controllability and low observability, which will result in that Trojan logics have extremely low transitions during the simulation. This implies that the regions with the low transitions will provide much more abundant and more important information for HT detection. The HTDet applies information theory technology and a density-based clustering algorithm called Density-Based Spatial Clustering of Applications with Noise (DBSCAN) to detect all suspicious Trojan logics in the circuit under detection. The DBSCAN is an unsupervised learning algorithm, that can improve the applicability of HTDet. In addition, we develop a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan logics. Experiments on circuit benchmarks demonstrate the effectiveness of HTDet.

References

[1]
L. Li, G. Ren, Y. Liu, and J. Wu, Secure DHCPv6 mechanism for DHCPv6 security and privacy protection, Tsinghua Science and Technology, vol. 23, no. 1, pp. 13-21, 2018.
[2]
S. Liang, Y. Zhang, B. Li, X. Guo, C. Jia, and Z. Liu, Secureweb: Protecting sensitive information through the web browser extension with a security token, Tsinghua Science and Technology, vol. 23, no. 5, pp. 526-538, 2018.
[3]
K. Fan, H. Li, W. Jiang, C. Xiao, and Y. Yang, Secure authentication protocol for mobile payment, Tsinghua Science and Technology, vol. 23, no. 5, pp. 610-620, 2018.
[4]
X. Jin, Q. Wang, X. Li, X. Chen, and W. Wang, Cloud virtual machine lifecycle security framework based on trusted computing, Tsinghua Science and Technology, vol. 24, no. 5, pp. 520-534, 2019.
[5]
Y. Wu, Y. Lyu, and Y. Shi, Cloud storage security assessment through equilibrium analysis, Tsinghua Science and Technology, vol. 24, no. 6, pp. 738-749, 2019.
[6]
M. Tehranipoor, H Salmani, X. H. Zhang, R. Karri, J. Rajendran, and K. Rosenfeld, Trustworthy hardware: Trojan detection and design-for-trust challenges, Computer, vol. 44, no. 7, pp. 66-74, 2011.
[7]
Q. Q. Wang, R. Geiger, and D. G. Chen, Hardware Trojans embedded in the dynamic operation of analog and mixed-signal circuits, presented at National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 2015.
[8]
B. Shakya, T. He, H. Salmani, D. Forte, S. Bhunia, and M. Tehranipoor, Benchmarking of hardware trojans and maliciously affected circuits, Journal of Hardware and Systems Security, vol. 1, no. 1, pp. 85-102, 2017.
[9]
W. C. Li, Z. Wasson, and S. Seshia, Reverse engineering circuits using behavioral pattern mining, presented at the International Symposium on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA, 2012.
[10]
C. X. Bao, D. Forte, and A. Srivastava, On application of one-class SVM to reverse engineering-based hardware trojan detection, presented at the 15th International Symposium on Quality Electronic Design, Santa Clara, CA, USA, 2014.
[11]
C. X. Bao, D. Forte, and A. Srivastava, On reverse engineering-based hardware trojan detection, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 1, pp. 49-57, 2016.
[12]
R. Rad, X. X. Wang, M. Tehranipoor, and J. Plusquellic, Power supply signal calibration techniques for improving detection resolution to hardware trojans, in Proc. of International Conference on Computer-Aided Design, San Jose, CA, USA, 2008, pp. 632-639.
[13]
S. Wei and M. Potkonjak, Scalable hardware trojan diagnosis, IEEE Transactions on Very Large Scale Integration, vol. 20, no. 6, pp. 1049-1057, 2012.
[14]
J. Li and J. Lach, At-speed delay characterization for IC authentication and trojan horse detection, presented at the International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2008.
[15]
P. L. Song, F. Stellari, D. Pfeiffer, J. Culp, A. Bonnoit, B. Wisnieff, and M. Taubenblatt, MARVEL-malicious alteration recognition and verification by emission of light, presented at the International Symposium on Hardware-Oriented Security and Trust, San Diego, CA, USA, 2011.
[16]
K. Q. Hu, A. Nowroz, S. Reda, and F. Koushanfar, High-sensitivity hardware trojan detection using multimodal characterization, in Proceedings of the Conference on Design, Automation and Test in Europe, Grenoble, France, 2013, pp. 1271-1276.
[17]
A. Nowroz, K. Q. Hu, F. Koushanfar, and S. Reda, Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps, Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1792-1805, 2014.
[18]
S. Narasimhan, D. Du, R. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, and S. Bhunia, Hardware trojan detection by multiple-parameter side-channel analysis, Transactions on Computers, vol. 62, no. 11, pp. 2183-2195, 2013.
[19]
W. Hu, B. Mao, J. Oberg, and R. Kastner, Detecting hardware trojans with gate-level information-flow tracking, Computer, vol. 49, no. 8, pp. 44-52, 2016.
[20]
W. Hu, D. Mu, J. Oberg, B. Mao, M. Tiwari, T. Sherwood, and R. Kastner, Gate-level information flow tracking for security lattices, ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 20, no. 1, p. 2, 2014.
[21]
W. Hu, J. Oberg, A. Irturk, M. Tiwari, T. Sherwood, D. Mu, and R. Kastner, Theoretical fundamentals of gate level information flow tracking, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 30, no. 8, pp. 1128-1140, 2011.
[22]
M. Oya, Y. H. Shi, M. Yanagisawa, and N. Togawa, A score-based classification method for identifying hardware-trojans at gate-level netlists, in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2015, pp. 465-470.
[23]
K. Hasegawa, M. Oya, M. Yanagisawa, and N. Togawa, Hardware trojans classification for gate-level netlists based on machine learning, presented at the 22th International Symposium on On-Line Testing and Robust System Design (IOLTS), Sant Feliu de Guixols, Spain, 2016.
[24]
K. Hasegawa, M. Yanagisawa, and N. Togawa, Hardware trojans classification for gate-level netlists using multi-layer neural networks, presented at the 23th International Symposium on On-Line Testing and Robust System Design (IOLTS), Thessaloniki, Greece, 2017.
[25]
K. Hasegawa, M. Yanagisawa, and N. Togawa, Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier, presented at the International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 2017.
[26]
S. Yao, X. M. Chen, J. Zhang, Q. Y. Liu, J. Wang, Q. Xu, Y. Wang, and H. Z. Yang, Fastrust: Feature analysis for third-party IP trust verification, presented at the International Test Conference (ITC), Anaheim, CA, USA, 2015.
[27]
X. M. Chen, Q. Y. Liu, S. Yao, J. Wang, Q. Xu, Y. Wang, Y. P. Liu, and H. Z. Yang, Hardware trojan detection in third-party digital intellectual property cores by multilevel feature analysis, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 7, pp. 1370-1383, 2018.
[28]
H. Salmani, M. Tehranipoor, and J. Plusquellic, A novel technique for improving hardware trojan detection and reducing trojan activation time, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 20, no. 1, pp. 112-125, 2012.
[29]
A. Waksman, M. Suozzo, and S. Sethumadhavan, FANCI: Identification of stealthy malicious logic using boolean functional analysis, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 2013, pp. 697-708.
[30]
B. Cakir and S. Malik, Hardware trojan detection for gate-level ICs using signal correlation-based clustering, in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2015, pp. 471-476.
[31]
H. Salmani, COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist, IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 338-350, 2017.
[32]
H. H. Shen, H. Z. Tan, H. W. Li, F. Zhang, and X. W. Li, LMDet: A “Naturalness” statistical method for hardware trojan detection, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 26, no. 4, pp. 720-732, 2018.
[33]
R. Chakraborty, S. Paul, and S. Bhunia, On-demand transparency for improving hardware trojan detectability, presented at the IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2008.
[34]
F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty, Towards trojan-free trusted ICs: Problem analysis and detection scheme, in Proceedings of the Conference on Design, Automation and Test in Europe, Anaheim, CA, USA, 2008, pp. 1362-1365.
[35]
W. T. Cheng, M. Sharma, T. Rinderknecht, L. Y. Lai, and C. Hill, Signature-based diagnosis for logic BIST, presented at the IEEE International Test Conference, Santa Clara, CA, USA, 2006.
[36]
G. Hetherington, T. Fryars, N. Tamarapalli, M. Kassab, A. Hassan, and J. Rajski, Logic BIST for large industrial designs: Real issues and case studies, in Proceedings of International Test Conference, Atlantic, NJ, USA, 1999, pp. 358-367.
[37]
H. Salmani, M. Tehranipoor, and R. Karri, On design vulnerability analysis and trust benchmarks development, presented at the 31st International Conference on Computer Design (ICCD), Asheville, NC, USA, 2013.
[38]
H. Akaike, Information theory and an extension of the maximum likelihood principle, Springer, pp. 199-213, 1998.
[39]
L. H. Goldstein and E. L. Thigpen, SCOAP: Sandia controllability/observability analysis program, presented at the 17th Design Automation Conference, Minneapolis, MN, USA, 1980.
[40]
W. T. Wang, Y. L. Wu, C. Y. Tang, and M. Hor, Adaptive Density-Based Spatial Clustering of Applications with Noise (DBSCAN) according to data, presented at the International Conference on Machine Learning and Cybernetics (ICMLC), Guangdong, China, 2015.
[41]
H. C. Peng, F. H. Long, and C. Ding, Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy, IEEE Transactions on Pattern Analysis & Machine Intelligence, vol. 27, no. 8, pp. 1226-1238, 2005.
[42]
L. Buitinck, G. Louppe, M. Blondel, F. Pedregosa, A. Mueller, O. Grisel, V. Niculae, P. Prettenhofer, A. Gramfort, J. Grobler, and et al. API design for machine learning software: Experiences from the scikit-learn project, presented at the ECML PKDD Workshop: Languages for Data Mining and Machine Learning, Prague, Czech Republic, 2013.
Tsinghua Science and Technology
Pages 48-61
Cite this article:
Lu R, Shen H, Feng Z, et al. HTDet: A Clustering Method Using Information Entropy for Hardware Trojan Detection. Tsinghua Science and Technology, 2021, 26(1): 48-61. https://doi.org/10.26599/TST.2019.9010047

693

Views

38

Downloads

25

Crossref

N/A

Web of Science

33

Scopus

2

CSCD

Altmetrics

Received: 01 April 2019
Revised: 23 August 2019
Accepted: 29 August 2019
Published: 19 June 2020
© The author(s) 2021.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return