• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, L. (Chen, L..) [1] | Dong, C. (Dong, C..) [2] (Scholars:董晨) | Wu, Q. (Wu, Q..) [3] | Liu, X. (Liu, X..) [4] (Scholars:刘西蒙) | Guo, X. (Guo, X..) [5] | Chen, Z. (Chen, Z..) [6] | Zhang, H. (Zhang, H..) [7] (Scholars:张浩) | Yang, Y. (Yang, Y..) [8]

Indexed by:

Scopus

Abstract:

Due to the complexity of integrated circuit design and manufacturing process, an increasing number of third parties are outsourcing their untrusted Intellectual Property (IP) cores to pursue greater economic benefits, which may embed numerous security issues. The covert nature of hardware Trojans (HTs) poses a significant threat to cyberspace, and they may lead to catastrophic consequences for the national economy and personal privacy. To deal with HTs well, it is not enough to just detect whether they are included, like the existing studies. Same as malware, identifying the attack intentions of HTs, that is, analyzing the functions they implement, is of great scientific significance for the prevention and control of HTs. Based on the fined detection, for the first time, this paper proposes a two-stage Graph Neural Network model for HTs’ multifunctional classification, GNN4HT. In the first stage, GNN4HT localizes HTs, achieving a notable True Positive Rate (TPR) of 94.28 the Trust-Hub dataset and maintaining high performance on the TRTC-IC dataset. GNN4HT further transforms the localization results into HT Information Graphs (HTIGs), representing the functional interaction graphs of HTs. In the second stage, the dataset is augmented through logical equivalence for training and HT functionalities are classified based on the extracted HTIG from the first stage. For the multifunctional classification of HTs, the correct classification rate reached as high as 80.95% at gate-level and 62.96% at RTL. This paper marks a breakthrough in HT detection, and it is the first to address the multifunctional classification issue, holding significant practical importance and application prospects. Authors

Keyword:

Gate-level Golden-free Hardware Hardware Trojan HTIG HT location HT multifunctional classification Integrated circuit modeling Location awareness Logic gates RTL Security Training Trojan horses

Community:

  • [ 1 ] [Chen L.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 2 ] [Dong C.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 3 ] [Wu Q.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 4 ] [Liu X.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 5 ] [Guo X.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 6 ] [Chen Z.]Department of Computer Science and Engineering, University of South Florida, E. Fowler Avenue, Tampa, Florida, USA
  • [ 7 ] [Zhang H.]College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 8 ] [Yang Y.]School of Computing and Information Systems, Singapore Management University, Singapore, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

ISSN: 0278-0070

Year: 2024

Page: 1-1

2 . 7 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Online/Total:298/10035071
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1