Abstract

Hardware Trojans (HT) are tiny, malicious circuits intentionally designed by an adversary. The existing works found in the literature on gate-level netlists are mainly based on supervised classification with few attempts at unsupervised clustering. However, the over-reliance on pre-defined structural features used in these supervised classification methods makes them vulnerable to the new Trojan attacks, whereas most unsupervised methods ignore this feature completely. This work presents an unsupervised approach for HT net detection based on the structural features required for small rare-event triggered HTs irrespective of the payload. The proposed work uses k-means clustering on these features to reduce the search space. A new metric based on combinational controllability is applied next to detect the possible trigger net. Experimental results of fifteen selected Trust-HUB benchmarks show the capability of the proposed technique against different types of HT triggers. Results show that the proposed approach reduces the search space massively (up to 99%) while running within a reasonable time frame.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call