Review of machine learning based hardware Trojan detection methods

As integrated circuit (IC) design gets more complicated, outsourcing parts of the IC design and fabrication is commonly applied to simplify the production and reduce the cost. This leads to the threat of malicious manipulation to the design by the third parties involved. Such threat is considered as...

Full description

Bibliographic Details
Main Authors: Choo, H. S., Ooi, C. Y., Inoue, M., Ismail, N., Kok, C. H.
Format: Article
Published: Science and Technology Research Institute for Defence 2019
Subjects:
_version_ 1796865090322956288
author Choo, H. S.
Ooi, C. Y.
Inoue, M.
Ismail, N.
Kok, C. H.
author_facet Choo, H. S.
Ooi, C. Y.
Inoue, M.
Ismail, N.
Kok, C. H.
author_sort Choo, H. S.
collection ePrints
description As integrated circuit (IC) design gets more complicated, outsourcing parts of the IC design and fabrication is commonly applied to simplify the production and reduce the cost. This leads to the threat of malicious manipulation to the design by the third parties involved. Such threat is considered as hardware Trojan attack, which could pose adverse impacts to a system or network. Recently, hardware Trojan is gaining more interest as a research subject, especially pre-silicon detection. Various kinds of hardware Trojan detection approaches have been proposed to detect different Trojan types in different circuits. This study summarises the existing hardware Trojan detection methods and discusses the attributes of the methods to better distinguish them between each other. Existing presilicon detection methods are reviewed, which includes verification-based, threshold-based and machine learning-based feature analysis techniques. The objective of this study is to ease the future hardware-Trojan-related research by providing an organised summary of detection techniques, especially pre-silicon detection.
first_indexed 2024-03-05T20:51:40Z
format Article
id utm.eprints-90740
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T20:51:40Z
publishDate 2019
publisher Science and Technology Research Institute for Defence
record_format dspace
spelling utm.eprints-907402021-04-29T23:48:57Z http://eprints.utm.my/90740/ Review of machine learning based hardware Trojan detection methods Choo, H. S. Ooi, C. Y. Inoue, M. Ismail, N. Kok, C. H. T Technology (General) As integrated circuit (IC) design gets more complicated, outsourcing parts of the IC design and fabrication is commonly applied to simplify the production and reduce the cost. This leads to the threat of malicious manipulation to the design by the third parties involved. Such threat is considered as hardware Trojan attack, which could pose adverse impacts to a system or network. Recently, hardware Trojan is gaining more interest as a research subject, especially pre-silicon detection. Various kinds of hardware Trojan detection approaches have been proposed to detect different Trojan types in different circuits. This study summarises the existing hardware Trojan detection methods and discusses the attributes of the methods to better distinguish them between each other. Existing presilicon detection methods are reviewed, which includes verification-based, threshold-based and machine learning-based feature analysis techniques. The objective of this study is to ease the future hardware-Trojan-related research by providing an organised summary of detection techniques, especially pre-silicon detection. Science and Technology Research Institute for Defence 2019 Article PeerReviewed Choo, H. S. and Ooi, C. Y. and Inoue, M. and Ismail, N. and Kok, C. H. (2019) Review of machine learning based hardware Trojan detection methods. Defence S and T Technical Bulletin, 13 (1). pp. 1-21. ISSN 1985-6571 https://www.scopus.com/record/display.uri?eid=2-s2.0-85087061269&origin=resultslist&sort=plf-f&src=s&sid=93a358e35bd4deab3680c8e6b4844a14&sot=b&sdt=b&sl=81&s=TITLE-ABS-KEY(Review+of+machine+learning+based+hardware+trojan+detection+methods)
spellingShingle T Technology (General)
Choo, H. S.
Ooi, C. Y.
Inoue, M.
Ismail, N.
Kok, C. H.
Review of machine learning based hardware Trojan detection methods
title Review of machine learning based hardware Trojan detection methods
title_full Review of machine learning based hardware Trojan detection methods
title_fullStr Review of machine learning based hardware Trojan detection methods
title_full_unstemmed Review of machine learning based hardware Trojan detection methods
title_short Review of machine learning based hardware Trojan detection methods
title_sort review of machine learning based hardware trojan detection methods
topic T Technology (General)
work_keys_str_mv AT choohs reviewofmachinelearningbasedhardwaretrojandetectionmethods
AT ooicy reviewofmachinelearningbasedhardwaretrojandetectionmethods
AT inouem reviewofmachinelearningbasedhardwaretrojandetectionmethods
AT ismailn reviewofmachinelearningbasedhardwaretrojandetectionmethods
AT kokch reviewofmachinelearningbasedhardwaretrojandetectionmethods