Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques

碩士 === 國立交通大學 === 資訊科學與工程研究所 === 107 === In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the ma...

Full description

Bibliographic Details
Main Authors: Chen, Jian-You, 陳建佑
Other Authors: Wu, Kai-Chiang
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/ep24r5
id ndltd-TW-107NCTU5394085
record_format oai_dc
spelling ndltd-TW-107NCTU53940852019-11-26T05:16:46Z http://ndltd.ncl.edu.tw/handle/ep24r5 Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques 基於機器學習技術使用路徑特徵針對硬體木馬的檢測與定位 Chen, Jian-You 陳建佑 碩士 國立交通大學 資訊科學與工程研究所 107 In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the malicious trojan circuit. In order to reduce the complexity of path counts in the training set of data and the classification/validation set of data, we use \textit{path filter} to filter out the paths which are very unlikely to be the trojan paths. For our machine learning models, we use the random forest (RF) and support vector machine (SVM) as our path classifiers. Due to the promising result of trojan path classification, we score the \textit{suspected trojan gates} which are on the \textit{suspected trojan paths} identified by the path classifier. Finally, we rank the suspected trojan gates in decreasing order of score, and show how suspicious a gate is in terms of being a trojan gate. On average, we obtain 94.57\% true positive rate (TPR) and 98.54\% true negative rate (TNR) of the \textit{trojan gate localization} of all trojan circuits. Wu, Kai-Chiang 吳凱強 2019 學位論文 ; thesis 25 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊科學與工程研究所 === 107 === In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the malicious trojan circuit. In order to reduce the complexity of path counts in the training set of data and the classification/validation set of data, we use \textit{path filter} to filter out the paths which are very unlikely to be the trojan paths. For our machine learning models, we use the random forest (RF) and support vector machine (SVM) as our path classifiers. Due to the promising result of trojan path classification, we score the \textit{suspected trojan gates} which are on the \textit{suspected trojan paths} identified by the path classifier. Finally, we rank the suspected trojan gates in decreasing order of score, and show how suspicious a gate is in terms of being a trojan gate. On average, we obtain 94.57\% true positive rate (TPR) and 98.54\% true negative rate (TNR) of the \textit{trojan gate localization} of all trojan circuits.
author2 Wu, Kai-Chiang
author_facet Wu, Kai-Chiang
Chen, Jian-You
陳建佑
author Chen, Jian-You
陳建佑
spellingShingle Chen, Jian-You
陳建佑
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
author_sort Chen, Jian-You
title Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
title_short Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
title_full Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
title_fullStr Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
title_full_unstemmed Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
title_sort using path features for hardware trojan detection and localization based on machine learning techniques
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/ep24r5
work_keys_str_mv AT chenjianyou usingpathfeaturesforhardwaretrojandetectionandlocalizationbasedonmachinelearningtechniques
AT chénjiànyòu usingpathfeaturesforhardwaretrojandetectionandlocalizationbasedonmachinelearningtechniques
AT chenjianyou jīyújīqìxuéxíjìshùshǐyònglùjìngtèzhēngzhēnduìyìngtǐmùmǎdejiǎncèyǔdìngwèi
AT chénjiànyòu jīyújīqìxuéxíjìshùshǐyònglùjìngtèzhēngzhēnduìyìngtǐmùmǎdejiǎncèyǔdìngwèi
_version_ 1719295862101770240