Hardware Trojans (HTs) have been generally inserted at the lower levels of the digital system design and fabrication process, where, due to the high complexity of the hardware model, their detection is more difficult. However, RTL models are becoming more and more complex, making difficult the identification of malicious behaviours also at this level. Unfortunately, only a few verification techniques have been proposed for the identification of HTs in RTL descriptions. To fill in the gap, this paper proposes a technique that exploits graph-based features and a probabilistic neural network to identify and classify HTs at RTL. The approach identifies suspicious locations inside the RTL description according to a set of known HTs. In addition, it returns a couple of similarity indexes to measure the probability that a suspicious location actually contains a malicious behaviour.

Exploiting sub-graph isomorphism and probabilistic neural networks for the detection of hardware Trojans at RTL

Demrozi, Florenc
;
Zucchelli, Riccardo;Pravadelli, Graziano
2017

Abstract

Hardware Trojans (HTs) have been generally inserted at the lower levels of the digital system design and fabrication process, where, due to the high complexity of the hardware model, their detection is more difficult. However, RTL models are becoming more and more complex, making difficult the identification of malicious behaviours also at this level. Unfortunately, only a few verification techniques have been proposed for the identification of HTs in RTL descriptions. To fill in the gap, this paper proposes a technique that exploits graph-based features and a probabilistic neural network to identify and classify HTs at RTL. The approach identifies suspicious locations inside the RTL description according to a set of known HTs. In addition, it returns a couple of similarity indexes to measure the probability that a suspicious location actually contains a malicious behaviour.
978-1-5090-3997-5
Hardware Trojan, Probabilistic Neural Network, Control Flow Graph, Graphlet, Neural networks,
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11562/971958
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? ND
social impact