Abstract
• A deep learning- based hardware trojan identification method is proposed. • The data imbalance in VLSI circuits is addressed by using deep convolutional generative adversarial network. • More suitable features are extracted using handcrafted algorithms and structural reports. • Stacked autoencoder and stacked sparse autoencoder model is used to discover the malicious logic in the gate level netlist. • The significance of sparsity is achieved by stacked sparse autoencoder technique, which minimizes the detection probability. The rate of development of technology and its associated security issues are increasing in integrated circuit industry. This provides a space for implanting dormant nature of threats, named Hardware Trojan (HT) in various process of integrated circuits (IC) design. The impact of HT’s emanates the encrypted signals, privacy disruption, performance degradation or denial of service. The threat models are unimaginable and it can be intruded at any stage which complicates the HT detection process. Therefore, a deep learning-based malicious module identification method is proposed in this work by implementing stacked autoencoder and stacked sparse autoencoder model. The simulation results shows that the proposed stacked sparse autoencoder outperforms the best in detecting the malicious modifications with an average accuracy of 97.53%, true positive rate of 93% and moreover the true negative rate achieved is 98.14% which proves the effectiveness of sparsity nature in extracting suitable features in the proposed schemes.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have