Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 107 === In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the ma...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/ep24r5 |
id |
ndltd-TW-107NCTU5394085 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NCTU53940852019-11-26T05:16:46Z http://ndltd.ncl.edu.tw/handle/ep24r5 Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques 基於機器學習技術使用路徑特徵針對硬體木馬的檢測與定位 Chen, Jian-You 陳建佑 碩士 國立交通大學 資訊科學與工程研究所 107 In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the malicious trojan circuit. In order to reduce the complexity of path counts in the training set of data and the classification/validation set of data, we use \textit{path filter} to filter out the paths which are very unlikely to be the trojan paths. For our machine learning models, we use the random forest (RF) and support vector machine (SVM) as our path classifiers. Due to the promising result of trojan path classification, we score the \textit{suspected trojan gates} which are on the \textit{suspected trojan paths} identified by the path classifier. Finally, we rank the suspected trojan gates in decreasing order of score, and show how suspicious a gate is in terms of being a trojan gate. On average, we obtain 94.57\% true positive rate (TPR) and 98.54\% true negative rate (TNR) of the \textit{trojan gate localization} of all trojan circuits. Wu, Kai-Chiang 吳凱強 2019 學位論文 ; thesis 25 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 107 === In this work, we proposed a hardware trojan detection method by using path features and machine learning techniques to localize the trojan gates of the untrusted circuits. First of all, we extract the \textit{path features} which are highly relative to the malicious trojan circuit. In order to reduce the complexity of path counts in the training set of data and the classification/validation set of data, we use \textit{path filter} to filter out the paths which are very unlikely to be the trojan paths. For our machine learning models, we use the random forest (RF) and support vector machine (SVM) as our path classifiers. Due to the promising result of trojan path classification, we score the \textit{suspected trojan gates} which are on the \textit{suspected trojan paths} identified by the path classifier. Finally, we rank the suspected trojan gates in decreasing order of score, and show how suspicious a gate is in terms of being a trojan gate. On average, we obtain 94.57\% true positive rate (TPR) and 98.54\% true negative rate (TNR) of the \textit{trojan gate localization} of all trojan circuits.
|
author2 |
Wu, Kai-Chiang |
author_facet |
Wu, Kai-Chiang Chen, Jian-You 陳建佑 |
author |
Chen, Jian-You 陳建佑 |
spellingShingle |
Chen, Jian-You 陳建佑 Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
author_sort |
Chen, Jian-You |
title |
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
title_short |
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
title_full |
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
title_fullStr |
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
title_full_unstemmed |
Using Path Features for Hardware Trojan Detection and Localization Based on Machine Learning Techniques |
title_sort |
using path features for hardware trojan detection and localization based on machine learning techniques |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/ep24r5 |
work_keys_str_mv |
AT chenjianyou usingpathfeaturesforhardwaretrojandetectionandlocalizationbasedonmachinelearningtechniques AT chénjiànyòu usingpathfeaturesforhardwaretrojandetectionandlocalizationbasedonmachinelearningtechniques AT chenjianyou jīyújīqìxuéxíjìshùshǐyònglùjìngtèzhēngzhēnduìyìngtǐmùmǎdejiǎncèyǔdìngwèi AT chénjiànyòu jīyújīqìxuéxíjìshùshǐyònglùjìngtèzhēngzhēnduìyìngtǐmùmǎdejiǎncèyǔdìngwèi |
_version_ |
1719295862101770240 |