Loading [MathJax]/extensions/MathMenu.js
GNN-Based Hardware Trojan Detection at Register Transfer Level Leveraging Multiple-Category Features | IEEE Journals & Magazine | IEEE Xplore

GNN-Based Hardware Trojan Detection at Register Transfer Level Leveraging Multiple-Category Features


Abstract:

The existing hardware Trojan (HT) detection technology usually relies on the golden reference model. With the continuous improvement of circuit integration, the detection...Show More

Abstract:

The existing hardware Trojan (HT) detection technology usually relies on the golden reference model. With the continuous improvement of circuit integration, the detection accuracy of traditional methods such as side-channel analysis has declined. Methods based on testability and switch probability analysis have shown high detection accuracy. However, these techniques have a limited detection scope and are generally ineffective at identifying HT where the Sandia controllability/observability analysis program (SCOAP) values or switch probabilities are similar to those of normal signals. Against this backdrop, this article proposes a detection method based on graph neural networks (GNNs), which can achieve HT detection at the register transfer level (RTL) without the golden reference model. First, the RTL code is transformed into a data flow graph (DFG), and node feature extraction and node label marking are carried out during the transformation process. To mitigate the impact of insufficient initial features on the GNN model performance, the node feature vector used in this article comprises 37-D node types and 6-D structural features such as the minimum distance from the primary input (PI) and primary output (PO), in-degree, and out-degree. Subsequently, several GNN models are built for node classification tasks. The best model achieves an average of 99.1% recall and 96.7% F1-score on the open-source dataset on the Trust-Hub platform. Compared to the state-of-the-art detection results at RTL, the F1-score in this article has increased by an average of 3.8%.
Page(s): 831 - 840
Date of Publication: 13 December 2024

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

The globalization of integrated circuit (IC) industries, such as smart devices, makes ICs face a huge risk of being implanted into hardware Trojans (HTs) by rivals. HTs typically consist of triggers and payloads [1], which will lead to product denial of service (DoS), functional damage, performance decline, or disclosure of confidential information when triggered [2], [3]. Traditional HT detection methods can be divided into pre-silicon detection [4], [5], [6], [7], [8] and post-silicon [9], [10], [11], [12] detection. Pre-silicon detection mainly involves test vector generation and formal verification (FV), while post-silicon detection encompasses reverse engineering and side-channel analysis. As some HTs can activate malicious functions by modifying circuit logic, testers aim to activate HTs using a set of test vectors. However, this approach proves to be highly inefficient in detecting large-scale designs. Furthermore, FV requires the definition of a set of security properties, limiting the effectiveness of this approach. In addition, the lack of golden models hinders the practical implementation of certain post-silicon detection techniques. Some suggested enhancements include integrating side-channel analysis with automatic test pattern generation (ATPG) algorithms to optimize path delay difference through logical testing [13]. Another enhancement is proposed by Chakraborty et al. [14], which reduces the target space of test vectors effectively using a genetic algorithm and significantly decreases the runtime compared to MERO [15].

Select All
1.
S. Bhunia, M. S. Hsiao, M. Banga and S. Narasimhan, "Hardware Trojan attacks: Threat analysis and countermeasures", Proc. IEEE, vol. 102, no. 8, pp. 1229-1247, Aug. 2014.
2.
J. Zhang, F. Yuan, L. Wei, Y. Liu and Q. Xu, "VeriTrust: Verification for hardware trust", IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 34, no. 7, pp. 1148-1161, Jul. 2015.
3.
T. Hoque, X. Wang, A. Basak, R. Karam and S. Bhunia, "Hardware trojan attacks in embedded memory", Proc. IEEE 36th VLSI Test Symp. (VTS), pp. 1-6, Apr. 2018.
4.
A. L. D. Antón, J. Müller, L. Deutschmann, M. R. Fadiheh, D. Stoffel and W. Kunz, "A golden-free formal method for trojan detection in non-interfering accelerators", Proc. Design Autom. Test Eur. Conf. Exhib. (DATE), pp. 1-6, Mar. 2024.
5.
C. S. Chuah, C. Appold and T. Leinmueller, "Formal verification of security properties on RISC-V processors", Proc. 21st ACM-IEEE Int. Conf. Formal Methods Models Syst. Design, pp. 159-168, Sep. 2023.
6.
A. Jayasena and P. Mishra, "Scalable detection of hardware trojans using ATPG-based activation of rare events", IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 42, no. 12, pp. 4450-4462, Dec. 2023.
7.
L. Zhang, T. Zhang, C. Xiao, J. Wang, D. Liu and D. Ding, "Detection methods of hardware trojans based on DBN and QPSO-OCSVM anomalous behavior analysis", Proc. 6th Int. Conf. Electron. Commun. Netw. Comput. Technol. (ECNCT), pp. 250-255, Jul. 2024.
8.
D. Lee, J. Lee, Y. Jung, J. Kauh and T. Song, "Robust hardware trojan detection method by unsupervised learning of electromagnetic signals", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Sep. 2024.
9.
N. P. Bhatta, U. Giri and F. Amsaad, "Machine learning-based classification of hardware trojans using power side-channel signals", Proc. IEEE 67th Int. Midwest Symp. Circuits Syst. (MWSCAS), pp. 990-994, Aug. 2024.
10.
C. He, D. Lei, H. Wu, L. Cheng, G. Yan and Q. Huang, "A side-channel hardware trojan detection method based on fuzzy C-means clustering and fusion distance algorithms", IEEE Internet Things J., vol. 11, no. 8, pp. 13927-13937, Apr. 2024.
11.
K. Vissamsetty and S. Ren, "Post-fabrication side channel malicious detection for 16X16 booth multiplier in 65nm CMOS technology", Proc. IEEE Nat. Aerosp. Electron. Conf., pp. 355-358, Jul. 2024.
12.
X. Wei, J. Zhang and G. Luo, "Rethinking IC layout vulnerability: Simulation-based hardware trojan threat assessment with high fidelity", Proc. IEEE Symp. Secur. Privacy (SP), pp. 3789-3804, May 2024.
13.
Y. Lyu and P. Mishra, "Automated test generation for trojan detection using delay-based side channel analysis", Proc. Design Autom. Test Eur. Conf. Exhib. (DATE), pp. 1031-1036, Mar. 2020.
14.
S. Chakraborty, A. Ghosh, A. Mondal and B. Sen, "Test pattern generation for detection of hardware trojans based on improved genetic algorithm", Proc. IEEE Bombay Sect. Signature Conf. (IBSSC), pp. 1-6, Dec. 2022.
15.
R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou and S. Bhunia, "MERO: A statistical approach for hardware trojan detection" in Cryptographic Hardware and Embedded Systems—CHES, , Berlin, Germany:Springer, pp. 396-410, 2009.
16.
G. Kornaros, "Hardware-assisted machine learning in resource-constrained IoT environments for security: Review and future prospective", IEEE Access, vol. 10, pp. 58603-58622, 2022.
17.
K. G. Liakos, G. K. Georgakilas, S. Moustakidis, P. Karlsson and F. C. Plessas, "Machine learning for hardware trojan detection: A review", Proc. Panhellenic Conf. Electron. Telecommun. (PACET), pp. 1-6, Nov. 2019.
18.
L. Waikhom and R. Patgiri, "Recurrent convolution based graph neural network for node classification in graph structure data", Proc. 12th Int. Conf. Cloud Comput. Data Sci. Eng. (Confluence), pp. 201-206, Jan. 2022.
19.
Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang and P. S. Yu, "A comprehensive survey on graph neural networks", IEEE Trans. Neural Netw. Learn. Syst., vol. 32, no. 1, pp. 4-24, Jan. 2021.
20.
N. A. Asif et al., "Graph neural network: A comprehensive review on non-Euclidean space", IEEE Access, vol. 9, pp. 60588-60606, 2021.
21.
T. Bilot, N. E. Madhoun, K. A. Agha and A. Zouaoui, "Graph neural networks for intrusion detection: A survey", IEEE Access, vol. 11, pp. 49114-49139, 2023.
22.
S. A. Islam, F. Islam Mime, S. M. Asaduzzaman and F. Islam, "Socio-network analysis of RTL designs for hardware trojan localization", Proc. 22nd Int. Conf. Comput. Inf. Technol. (ICCIT), pp. 1-6, Dec. 2019.
23.
M. Hashemi, A. Momeni, A. Pashrashid and S. Mohammadi, "Graph centrality algorithms for hardware trojan detection at gate-level netlists", Int. J. Eng., vol. 35, no. 7, pp. 1375-1387, 2022.
24.
H. Li, A. Abdelhadi, R. Shi, J. Zhang and Q. Liu, "Adversarial hardware with functional and topological camouflage", IEEE Trans. Circuits Syst. II Exp. Briefs, vol. 68, no. 5, pp. 1685-1689, May 2021.
25.
T. Kurihara, K. Hasegawa and N. Togawa, "Evaluation on hardware-trojan detection at gate-level IP cores utilizing machine learning methods", Proc. IEEE 26th Int. Symp. On-Line Test. Robust Syst. Design (IOLTS), pp. 1-4, Jul. 2020.
26.
R. Negishi, T. Kurihara and N. Togawa, "Hardware-trojan detection at gate-level netlists using gradient boosting decision tree models", Proc. IEEE 12th Int. Conf. Consum. Electron. (ICCE-Berlin), pp. 1-6, Sep. 2022.
27.
H. Salmani, "Gradual-N-justification (GNJ) to reduce false-positive hardware trojan detection in gate-level netlist", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 30, no. 4, pp. 515-525, Apr. 2022.
28.
K. Hasegawa, K. Yamashita, S. Hidano, K. Fukushima, K. Hashimoto and N. Togawa, "Node-wise hardware trojan detection based on graph learning", IEEE Trans. Comput., May 2023.
29.
R. Yasaei, S.-Y. Yu and M. A. Al Faruque, "GNN4TJ: Graph neural networks for hardware trojan detection at register transfer level", Proc. Design Autom. Test Eur. Conf. Exhib. (DATE), pp. 1504-1509, Feb. 2021.
30.
R. Yasaei, S. Faezi and M. A. Al Faruque, "Golden reference-free hardware trojan localization using graph convolutional network", IEEE Trans. Very Large Scale Integr. Syst., vol. 30, no. 10, pp. 1401-1411, Oct. 2022.

Contact IEEE to Subscribe

References

References is not available for this document.