On Reverse Engineering-Based Hardware Trojan Detection

Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on computer-aided design of integrated circuits and systems Ročník 35; číslo 1; s. 49 - 57
Hlavní autori: Chongxi Bao, Forte, Domenic, Srivastava, Ankur
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York IEEE 01.01.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:0278-0070, 1937-4151
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention. Many test-time approaches assume the existence of a Trojan-free (TF) chip/model also known as "golden model." Prior works suggest using reverse engineering (RE) to identify such TF ICs for the golden model. However, they did not state how to do this efficiently. In fact, RE is a very costly process which consumes lots of time and intensive manual effort. It is also very error prone. In this paper, we propose an innovative and robust RE scheme to identify the TF ICs. We reformulate the Trojan-detection problem as clustering problem. We then adapt a widely used machine learning method, {K} -means clustering, to solve our problem. Simulation results using state-of-the-art tools on several publicly available circuits show that the proposed approach can detect HTs with high accuracy rate. A comparison of this approach with our previously proposed approach [1] is also conducted. Both the limitations and application scenarios of the two methods are discussed in detail.
AbstractList Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention. Many test-time approaches assume the existence of a Trojan-free (TF) chip/model also known as "golden model." Prior works suggest using reverse engineering (RE) to identify such TF ICs for the golden model. However, they did not state how to do this efficiently. In fact, RE is a very costly process which consumes lots of time and intensive manual effort. It is also very error prone. In this paper, we propose an innovative and robust RE scheme to identify the TF ICs. We reformulate the Trojan-detection problem as clustering problem. We then adapt a widely used machine learning method, [Formula Omitted]-means clustering, to solve our problem. Simulation results using state-of-the-art tools on several publicly available circuits show that the proposed approach can detect HTs with high accuracy rate. A comparison of this approach with our previously proposed approach [1] is also conducted. Both the limitations and application scenarios of the two methods are discussed in detail.
Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia as well as industry. To reduce the risks associated with Trojans, researchers have proposed different approaches to detect them. Among these approaches, test-time detection approaches have drawn the greatest attention. Many test-time approaches assume the existence of a Trojan-free (TF) chip/model also known as "golden model." Prior works suggest using reverse engineering (RE) to identify such TF ICs for the golden model. However, they did not state how to do this efficiently. In fact, RE is a very costly process which consumes lots of time and intensive manual effort. It is also very error prone. In this paper, we propose an innovative and robust RE scheme to identify the TF ICs. We reformulate the Trojan-detection problem as clustering problem. We then adapt a widely used machine learning method, {K} -means clustering, to solve our problem. Simulation results using state-of-the-art tools on several publicly available circuits show that the proposed approach can detect HTs with high accuracy rate. A comparison of this approach with our previously proposed approach [1] is also conducted. Both the limitations and application scenarios of the two methods are discussed in detail.
Author Chongxi Bao
Forte, Domenic
Srivastava, Ankur
Author_xml – sequence: 1
  surname: Chongxi Bao
  fullname: Chongxi Bao
  email: borisbcx@umd.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
– sequence: 2
  givenname: Domenic
  surname: Forte
  fullname: Forte, Domenic
  email: dforte@ece.ufl.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Florida, Gainesville, FL, USA
– sequence: 3
  givenname: Ankur
  surname: Srivastava
  fullname: Srivastava, Ankur
  email: ankurs@umd.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
BookMark eNp9kE1PwkAQQDcGEwH9AcZLEy9eiju73a8jAooJCYnBc7O0U7IEtrhbNP5720A8ePA0l_cmM29Aer72SMgt0BEANY-ryXg6YhTEiGVaZ0ZckD4YrtIMBPRInzKlU0oVvSKDGLeUQiaY6RO59MkbfmKImMz8xnnE4PwmfbIRy2RuQ_llAyarUG-tT6bYYNG42l-Ty8ruIt6c55C8P89Wk3m6WL68TsaLtOBMNqkuM6MFaBCcG2TrSmipgPGSmjWVqhBSW1ai0VCZUpbGYAlrpMAKaiCrKj4kD6e9h1B_HDE2-d7FAnc767E-xhyU4SxjIEWL3v9Bt_Ux-Pa6lhLAKTNSt5Q6UUWoYwxY5YVrbPdSE6zb5UDzrmfe9cy7nvm5Z2vCH_MQ3N6G73-du5PjEPGXV8xwKRT_AXPxf8s
CODEN ITCSDI
CitedBy_id crossref_primary_10_1109_TCAD_2024_3518417
crossref_primary_10_1109_TCAD_2020_3012236
crossref_primary_10_1145_3579823
crossref_primary_10_3390_s20185165
crossref_primary_10_1016_j_vlsi_2022_12_011
crossref_primary_10_1155_2021_6682674
crossref_primary_10_1016_j_jksuci_2023_101822
crossref_primary_10_1016_j_mee_2023_112107
crossref_primary_10_32604_cmes_2021_015462
crossref_primary_10_1145_3439951
crossref_primary_10_1063_5_0038773
crossref_primary_10_1109_ACCESS_2022_3175615
crossref_primary_10_1016_j_hcc_2023_100114
crossref_primary_10_1109_ACCESS_2018_2887268
crossref_primary_10_1145_3769081
crossref_primary_10_1109_TCAD_2021_3098740
crossref_primary_10_1049_iet_cdt_2020_0041
crossref_primary_10_1109_MMM_2023_3303591
crossref_primary_10_1109_JIOT_2020_2994627
crossref_primary_10_1016_j_microrel_2021_114212
crossref_primary_10_1109_ACCESS_2020_2965016
crossref_primary_10_1109_TVLSI_2019_2933441
crossref_primary_10_1109_ACCESS_2020_3001239
crossref_primary_10_1109_TVLSI_2020_3047020
crossref_primary_10_1109_ACCESS_2021_3114360
crossref_primary_10_1109_TVLSI_2022_3140250
crossref_primary_10_1109_TC_2023_3271126
crossref_primary_10_1109_TCAD_2021_3073855
crossref_primary_10_1007_s10836_025_06185_3
crossref_primary_10_1109_MDAT_2017_2766170
crossref_primary_10_1007_s10836_024_06122_w
crossref_primary_10_1109_ACCESS_2023_3340618
crossref_primary_10_1587_elex_22_20250131
crossref_primary_10_1016_j_vlsi_2024_102312
crossref_primary_10_1016_j_measurement_2022_111055
crossref_primary_10_3390_electronics11244138
crossref_primary_10_1049_iet_cdt_2018_5120
crossref_primary_10_1007_s10836_016_5631_z
crossref_primary_10_1007_s00521_023_08346_x
crossref_primary_10_1109_ACCESS_2019_2932478
crossref_primary_10_1007_s13389_022_00295_w
crossref_primary_10_1109_TNNLS_2022_3168540
crossref_primary_10_1109_TIFS_2019_2946044
crossref_primary_10_1016_j_asoc_2021_108068
crossref_primary_10_1109_ACCESS_2025_3538936
crossref_primary_10_1109_TVLSI_2022_3143349
crossref_primary_10_1007_s10836_018_5726_9
crossref_primary_10_1016_j_micpro_2020_103122
crossref_primary_10_1007_s10836_024_06150_6
crossref_primary_10_1080_02564602_2016_1246385
crossref_primary_10_3390_electronics11152400
crossref_primary_10_1007_s10586_024_04715_w
crossref_primary_10_3390_electronics11132054
crossref_primary_10_1109_TC_2024_3449082
crossref_primary_10_1145_3464959
crossref_primary_10_3390_cryptography8030036
crossref_primary_10_1016_j_vlsi_2021_03_001
crossref_primary_10_3233_JIFS_179838
crossref_primary_10_1016_j_mejo_2021_105162
crossref_primary_10_1007_s11227_023_05450_6
crossref_primary_10_1109_ACCESS_2023_3294282
crossref_primary_10_1109_TNNLS_2022_3185529
crossref_primary_10_1109_JIOT_2023_3339488
crossref_primary_10_1016_j_vlsi_2019_11_005
crossref_primary_10_1177_1550147719888098
crossref_primary_10_3390_s25154880
crossref_primary_10_1016_j_micpro_2020_103295
Cites_doi 10.1109/HST.2011.5954998
10.1109/HST.2010.5513122
10.1109/MDT.2010.21
10.1109/ISQED.2014.6783305
10.1007/978-1-4419-8080-9_14
10.1145/2024724.2024805
10.1109/VLSI.Design.2009.22
10.1109/VTS.2012.6231062
10.1109/TCAD.2015.2404876
10.1007/978-3-642-04138-9_28
10.1109/TVLSI.2011.2147341
10.1007/978-1-4419-8080-9_15
10.1109/HST.2011.5954999
10.1007/s10207-010-0115-0
10.1109/MDT.2010.7
10.1109/AHS.2010.5546257
10.1109/ICCCI.2013.6466310
10.1109/TVLSI.2010.2093547
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TCAD.2015.2488495
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEL
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEL
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-4151
EndPage 57
ExternalDocumentID 3903442771
10_1109_TCAD_2015_2488495
7293657
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation
  grantid: 1223233
  funderid: 10.13039/100000001
GroupedDBID --Z
-~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PZZ
RIA
RIE
RNS
TN5
VH1
VJK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c326t-8d49851815339e2bf5867123d09b067c568a2de981f9d6d99ed1be012c0914ff3
IEDL.DBID RIE
ISICitedReferencesCount 106
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000367338300004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0278-0070
IngestDate Thu Oct 02 09:37:42 EDT 2025
Mon Jun 30 10:17:14 EDT 2025
Tue Nov 18 22:23:12 EST 2025
Sat Nov 29 01:40:39 EST 2025
Tue Aug 26 16:42:57 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords one-class support vector machine (SVM)
reverse-engineering (RE)-based HT detection
Hardware Trojan (HT) detection
integrated circuit (IC) security and trust
{K} -means clustering
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c326t-8d49851815339e2bf5867123d09b067c568a2de981f9d6d99ed1be012c0914ff3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1751302968
PQPubID 85470
PageCount 9
ParticipantIDs crossref_citationtrail_10_1109_TCAD_2015_2488495
crossref_primary_10_1109_TCAD_2015_2488495
ieee_primary_7293657
proquest_miscellaneous_1793242165
proquest_journals_1751302968
PublicationCentury 2000
PublicationDate 2016-Jan.
2016-1-00
20160101
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-Jan.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on computer-aided design of integrated circuits and systems
PublicationTitleAbbrev TCAD
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
li (ref19) 2012
ref14
ref20
ref11
ref10
ref2
ref1
ref17
ref18
ref8
ref7
ref9
ref4
ref3
ref6
ref5
fradkin (ref16) 2004
References_xml – ident: ref3
  doi: 10.1109/HST.2011.5954998
– ident: ref13
  doi: 10.1109/HST.2010.5513122
– ident: ref5
  doi: 10.1109/MDT.2010.21
– ident: ref1
  doi: 10.1109/ISQED.2014.6783305
– start-page: 1331
  year: 2012
  ident: ref19
  article-title: A sensor-assisted self-authentication framework for hardware Trojan detection
  publication-title: Proc Conf Design Autom Test Europe
– ident: ref2
  doi: 10.1007/978-1-4419-8080-9_14
– ident: ref7
  doi: 10.1145/2024724.2024805
– year: 2004
  ident: ref16
  article-title: A study of K-means clustering for improving classification accuracy of multi-class SVM
– ident: ref18
  doi: 10.1109/VLSI.Design.2009.22
– ident: ref10
  doi: 10.1109/VTS.2012.6231062
– ident: ref15
  doi: 10.1109/TCAD.2015.2404876
– ident: ref4
  doi: 10.1007/978-3-642-04138-9_28
– ident: ref20
  doi: 10.1109/TVLSI.2011.2147341
– ident: ref6
  doi: 10.1007/978-1-4419-8080-9_15
– ident: ref12
  doi: 10.1109/HST.2011.5954999
– ident: ref8
  doi: 10.1007/s10207-010-0115-0
– ident: ref9
  doi: 10.1109/MDT.2010.7
– ident: ref14
  doi: 10.1109/AHS.2010.5546257
– ident: ref17
  doi: 10.1109/ICCCI.2013.6466310
– ident: ref11
  doi: 10.1109/TVLSI.2010.2093547
SSID ssj0014529
Score 2.5165796
Snippet Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 49
SubjectTerms Clustering
Design engineering
Fabrication
Feature extraction
Foundries
Hardware
Hardware Trojan detection
integrated circuit (IC) security and trust
Integrated circuits
K-Means clustering
Layout
Manuals
one-class SVM
Reverse engineering
reverse-engineering based hardware Trojan detection
Risk
Support vector machines
Trojan horses
Title On Reverse Engineering-Based Hardware Trojan Detection
URI https://ieeexplore.ieee.org/document/7293657
https://www.proquest.com/docview/1751302968
https://www.proquest.com/docview/1793242165
Volume 35
WOSCitedRecordID wos000367338300004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEL
  customDbUrl:
  eissn: 1937-4151
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014529
  issn: 0278-0070
  databaseCode: RIE
  dateStart: 19820101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5W8aAH3-L6ooInsdpnmhx9LZ5WkRW8laaZgCKtrF39-85ku2VBEbwVkj4ySTrfzDeZATgJdSp1ZgyZqZYMFIvC15mO_CRKdCCTmNWiKzaRDYfy-Vk99OCsOwuDiC74DM_50nH5pi4n7Cq7ICAYizRbgIUsE9OzWh1jwASi86dwxlhaxy2DGQbqYkSD4iCu9Dyi5ZpwKYk5HeSKqvz4Ezv1Mlj734etw2oLI73L6bxvQA-rTViZSy64BeK-8h6Roy7Qm2vwr0hvGY8Z-69ijN5oXL8WlXeDjQvKqrbhaXA7ur7z2yoJfknQq_GlSRTBJsnATWGkbcop66LYBEqTKipTIYvIoJKhVUYYpdCEGkkvlQQVEmvjHVis6gp3wbNk_pRG2NKkKglDW2SxtCINyeSzQmjdh2Amt7xsU4hzJYu33JkSgcpZ1DmLOm9F3YfT7pb3af6MvzpvsWy7jq1Y-3Awm5y83WEfOcEe5lyVkH047pppbzDhUVRYT7iPYrwYinTv9yfvwzK9v3WpHMBiM57gISyVn83Lx_jILbBvOLzKlA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dSxwxEB-sCq0P2mpLz69uwafi3u1nNnn06zhRTykn-LZsNhOoyF65D_33nYlxOVAKfVtIsmQnyc5v5jeZATiIdS51YQyZqZYMFIsi1IVOwizJdCSzlNWiKzZRDIfy7k7dLMFhexcGEV3wGXb50XH5ZlzP2VXWIyCYirz4ACtcOcvf1mo5A6YQnUeFc8bSTvYcZhyp3og-i8O48m5CGzbjYhILWsiVVXnzL3YKpr_xf1P7DOseSAZHLyv_BZaw2YS1hfSCWyCum-A3ctwFBgsN4TFpLhMwZ_9UTTAYTcb3VROc4syFZTVf4bZ_NjoZhL5OQlgT-JqF0mSKgJNk6KYw0TbnpHVJaiKlSRnVuZBVYlDJ2CojjFJoYo2kmWoCC5m16TdYbsYNfofAkgFUG2Frk6ssjm1VpNKKPCajzwqhdQeiV7mVtU8izrUsHkpnTESqZFGXLOrSi7oDv9ohf18yaPyr8xbLtu3oxdqB3dfFKf0Zm5YEfJh1VUJ24GfbTKeDKY-qwfGc-yhGjLHIt99_8w_4OBhdXZaX58OLHfhEc_EOll1Ynk3muAer9ePsz3Sy7zbbM_Pozd0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+Reverse+Engineering-Based+Hardware+Trojan+Detection&rft.jtitle=IEEE+transactions+on+computer-aided+design+of+integrated+circuits+and+systems&rft.au=Bao%2C+Chongxi&rft.au=te%2C+Domenic&rft.au=Srivastava%2C+Ankur&rft.date=2016-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0278-0070&rft.eissn=1937-4151&rft.volume=35&rft.issue=1&rft.spage=49&rft_id=info:doi/10.1109%2FTCAD.2015.2488495&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3903442771
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0070&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0070&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0070&client=summon