• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Dong, C. (Dong, C..) [1] | He, G. (He, G..) [2] | Liu, X. (Liu, X..) [3] | Yang, Y. (Yang, Y..) [4] | Guo, W. (Guo, W..) [5]

Indexed by:

Scopus

Abstract:

Since integrated circuits are performed by several untrusted manufacturers, malicious circuits (hardware Trojans) can be implanted in any stage of the Internet-of-Things (IoT) devices. With the globalization of the IoT device manufacturing technologies, protecting the system-on-chip (SoC) security is always the keys issue for scientists and IC manufacturers. The existing SoC high-level synthesis approaches cannot guarantee both register-transfer-level and gate-level security, such as some formal verification and circuit characteristic analysis technologies. Based on the structural characteristics of hardware Trojans, we propose a multi-layer hardware Trojan protection framework for the Internet-of-Things perception layer called RG-Secure, which combines the third-party intellectual property trusted design strategy with the scan-chain netlist feature analysis technology. Especially at the gate level of chip design, our RG-Secure is equipped with a distributed, lightweight gradient lifting algorithm called lightGBM. The algorithm can quickly process high-dimensional circuit feature information and effectively improve the detection efficiency of hardware Trojans. In the meanwhile, a common evaluation index F-measure is used to prove the effectiveness of our method. The experiments show that RG-Secure framework can simultaneously detect register-transfer-level and gate-level hardware Trojans. For the trust-HUB benchmarks, the optimized lightGBM classifier achieves up to 100% true positive rate and 94% true negative rate; furthermore, it achieves 99.8% average F-measure and 99% accuracy, which shows a promising approach to ensure security during the design stage. © 2013 IEEE.

Keyword:

hardware security; hardware Trojan; Internet of Things; protection framework

Community:

  • [ 1 ] [Dong, C.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 2 ] [Dong, C.]Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350116, China
  • [ 3 ] [He, G.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 4 ] [He, G.]Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350116, China
  • [ 5 ] [Liu, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 6 ] [Liu, X.]Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350116, China
  • [ 7 ] [Yang, Y.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 8 ] [Yang, Y.]Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350116, China
  • [ 9 ] [Guo, W.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116, China
  • [ 10 ] [Guo, W.]Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou University, Fuzhou, 350116, China

Reprint 's Address:

  • [Guo, W.]College of Mathematics and Computer Science, Fuzhou UniversityChina

Show more details

Related Keywords:

Related Article:

Source :

IEEE Access

ISSN: 2169-3536

Year: 2019

Volume: 7

Page: 23628-23639

3 . 7 4 5

JCR@2019

3 . 4 0 0

JCR@2023

ESI HC Threshold:150

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:147/10871866
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1