SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we pr...
Ausführliche Beschreibung
Autor*in: |
Tebyanian, Mahshid [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021 |
---|
Schlagwörter: |
---|
Anmerkung: |
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of electronic testing - Springer US, 1990, 37(2021), 4 vom: Aug., Seite 473-487 |
---|---|
Übergeordnetes Werk: |
volume:37 ; year:2021 ; number:4 ; month:08 ; pages:473-487 |
Links: |
---|
DOI / URN: |
10.1007/s10836-021-05960-2 |
---|
Katalog-ID: |
OLC2077423587 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2077423587 | ||
003 | DE-627 | ||
005 | 20230505145550.0 | ||
007 | tu | ||
008 | 221220s2021 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s10836-021-05960-2 |2 doi | |
035 | |a (DE-627)OLC2077423587 | ||
035 | |a (DE-He213)s10836-021-05960-2-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |a 670 |q VZ |
100 | 1 | |a Tebyanian, Mahshid |e verfasserin |4 aut | |
245 | 1 | 0 | |a SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
264 | 1 | |c 2021 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 | ||
520 | |a Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. | ||
650 | 4 | |a Controllability and observability | |
650 | 4 | |a Hardware testability | |
650 | 4 | |a K -means clustering | |
650 | 4 | |a Hardware Trojan detection | |
650 | 4 | |a Hardware security | |
700 | 1 | |a Mokhtarpour, Azadeh |4 aut | |
700 | 1 | |a Shafieinejad, Alireza |0 (orcid)0000-0002-2449-2914 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of electronic testing |d Springer US, 1990 |g 37(2021), 4 vom: Aug., Seite 473-487 |w (DE-627)130869090 |w (DE-600)1033317-4 |w (DE-576)024991600 |x 0923-8174 |7 nnns |
773 | 1 | 8 | |g volume:37 |g year:2021 |g number:4 |g month:08 |g pages:473-487 |
856 | 4 | 1 | |u https://doi.org/10.1007/s10836-021-05960-2 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a SSG-OLC-MAT | ||
951 | |a AR | ||
952 | |d 37 |j 2021 |e 4 |c 08 |h 473-487 |
author_variant |
m t mt a m am a s as |
---|---|
matchkey_str |
article:09238174:2021----::codadaerjneetobsdneunilobntoatsaiiyet |
hierarchy_sort_str |
2021 |
publishDate |
2021 |
allfields |
10.1007/s10836-021-05960-2 doi (DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p DE-627 ger DE-627 rakwb eng 004 670 VZ Tebyanian, Mahshid verfasserin aut SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security Mokhtarpour, Azadeh aut Shafieinejad, Alireza (orcid)0000-0002-2449-2914 aut Enthalten in Journal of electronic testing Springer US, 1990 37(2021), 4 vom: Aug., Seite 473-487 (DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 0923-8174 nnns volume:37 year:2021 number:4 month:08 pages:473-487 https://doi.org/10.1007/s10836-021-05960-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 37 2021 4 08 473-487 |
spelling |
10.1007/s10836-021-05960-2 doi (DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p DE-627 ger DE-627 rakwb eng 004 670 VZ Tebyanian, Mahshid verfasserin aut SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security Mokhtarpour, Azadeh aut Shafieinejad, Alireza (orcid)0000-0002-2449-2914 aut Enthalten in Journal of electronic testing Springer US, 1990 37(2021), 4 vom: Aug., Seite 473-487 (DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 0923-8174 nnns volume:37 year:2021 number:4 month:08 pages:473-487 https://doi.org/10.1007/s10836-021-05960-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 37 2021 4 08 473-487 |
allfields_unstemmed |
10.1007/s10836-021-05960-2 doi (DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p DE-627 ger DE-627 rakwb eng 004 670 VZ Tebyanian, Mahshid verfasserin aut SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security Mokhtarpour, Azadeh aut Shafieinejad, Alireza (orcid)0000-0002-2449-2914 aut Enthalten in Journal of electronic testing Springer US, 1990 37(2021), 4 vom: Aug., Seite 473-487 (DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 0923-8174 nnns volume:37 year:2021 number:4 month:08 pages:473-487 https://doi.org/10.1007/s10836-021-05960-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 37 2021 4 08 473-487 |
allfieldsGer |
10.1007/s10836-021-05960-2 doi (DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p DE-627 ger DE-627 rakwb eng 004 670 VZ Tebyanian, Mahshid verfasserin aut SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security Mokhtarpour, Azadeh aut Shafieinejad, Alireza (orcid)0000-0002-2449-2914 aut Enthalten in Journal of electronic testing Springer US, 1990 37(2021), 4 vom: Aug., Seite 473-487 (DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 0923-8174 nnns volume:37 year:2021 number:4 month:08 pages:473-487 https://doi.org/10.1007/s10836-021-05960-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 37 2021 4 08 473-487 |
allfieldsSound |
10.1007/s10836-021-05960-2 doi (DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p DE-627 ger DE-627 rakwb eng 004 670 VZ Tebyanian, Mahshid verfasserin aut SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier 2021 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security Mokhtarpour, Azadeh aut Shafieinejad, Alireza (orcid)0000-0002-2449-2914 aut Enthalten in Journal of electronic testing Springer US, 1990 37(2021), 4 vom: Aug., Seite 473-487 (DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 0923-8174 nnns volume:37 year:2021 number:4 month:08 pages:473-487 https://doi.org/10.1007/s10836-021-05960-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT AR 37 2021 4 08 473-487 |
language |
English |
source |
Enthalten in Journal of electronic testing 37(2021), 4 vom: Aug., Seite 473-487 volume:37 year:2021 number:4 month:08 pages:473-487 |
sourceStr |
Enthalten in Journal of electronic testing 37(2021), 4 vom: Aug., Seite 473-487 volume:37 year:2021 number:4 month:08 pages:473-487 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Journal of electronic testing |
authorswithroles_txt_mv |
Tebyanian, Mahshid @@aut@@ Mokhtarpour, Azadeh @@aut@@ Shafieinejad, Alireza @@aut@@ |
publishDateDaySort_date |
2021-08-01T00:00:00Z |
hierarchy_top_id |
130869090 |
dewey-sort |
14 |
id |
OLC2077423587 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2077423587</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505145550.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">221220s2021 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10836-021-05960-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2077423587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10836-021-05960-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">670</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tebyanian, Mahshid</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Controllability and observability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware testability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">K -means clustering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware Trojan detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mokhtarpour, Azadeh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shafieinejad, Alireza</subfield><subfield code="0">(orcid)0000-0002-2449-2914</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of electronic testing</subfield><subfield code="d">Springer US, 1990</subfield><subfield code="g">37(2021), 4 vom: Aug., Seite 473-487</subfield><subfield code="w">(DE-627)130869090</subfield><subfield code="w">(DE-600)1033317-4</subfield><subfield code="w">(DE-576)024991600</subfield><subfield code="x">0923-8174</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:37</subfield><subfield code="g">year:2021</subfield><subfield code="g">number:4</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:473-487</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10836-021-05960-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">37</subfield><subfield code="j">2021</subfield><subfield code="e">4</subfield><subfield code="c">08</subfield><subfield code="h">473-487</subfield></datafield></record></collection>
|
author |
Tebyanian, Mahshid |
spellingShingle |
Tebyanian, Mahshid ddc 004 misc Controllability and observability misc Hardware testability misc K -means clustering misc Hardware Trojan detection misc Hardware security SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
authorStr |
Tebyanian, Mahshid |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)130869090 |
format |
Article |
dewey-ones |
004 - Data processing & computer science 670 - Manufacturing |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0923-8174 |
topic_title |
004 670 VZ SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier Controllability and observability Hardware testability K -means clustering Hardware Trojan detection Hardware security |
topic |
ddc 004 misc Controllability and observability misc Hardware testability misc K -means clustering misc Hardware Trojan detection misc Hardware security |
topic_unstemmed |
ddc 004 misc Controllability and observability misc Hardware testability misc K -means clustering misc Hardware Trojan detection misc Hardware security |
topic_browse |
ddc 004 misc Controllability and observability misc Hardware testability misc K -means clustering misc Hardware Trojan detection misc Hardware security |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Journal of electronic testing |
hierarchy_parent_id |
130869090 |
dewey-tens |
000 - Computer science, knowledge & systems 670 - Manufacturing |
hierarchy_top_title |
Journal of electronic testing |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)130869090 (DE-600)1033317-4 (DE-576)024991600 |
title |
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
ctrlnum |
(DE-627)OLC2077423587 (DE-He213)s10836-021-05960-2-p |
title_full |
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
author_sort |
Tebyanian, Mahshid |
journal |
Journal of electronic testing |
journalStr |
Journal of electronic testing |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 600 - Technology |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
txt |
container_start_page |
473 |
author_browse |
Tebyanian, Mahshid Mokhtarpour, Azadeh Shafieinejad, Alireza |
container_volume |
37 |
class |
004 670 VZ |
format_se |
Aufsätze |
author-letter |
Tebyanian, Mahshid |
doi_str_mv |
10.1007/s10836-021-05960-2 |
normlink |
(ORCID)0000-0002-2449-2914 |
normlink_prefix_str_mv |
(orcid)0000-0002-2449-2914 |
dewey-full |
004 670 |
title_sort |
sc-cotd: hardware trojan detection based on sequential/combinational testability features using ensemble classifier |
title_auth |
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
abstract |
Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 |
abstractGer |
Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 |
abstract_unstemmed |
Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT |
container_issue |
4 |
title_short |
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier |
url |
https://doi.org/10.1007/s10836-021-05960-2 |
remote_bool |
false |
author2 |
Mokhtarpour, Azadeh Shafieinejad, Alireza |
author2Str |
Mokhtarpour, Azadeh Shafieinejad, Alireza |
ppnlink |
130869090 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10836-021-05960-2 |
up_date |
2024-07-03T15:29:01.637Z |
_version_ |
1803572259480141824 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2077423587</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230505145550.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">221220s2021 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10836-021-05960-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2077423587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10836-021-05960-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">670</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tebyanian, Mahshid</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Security against Hardware Trojans (HT) is an important concern in integrated circuits (IC) design and fabrication. Most of the current HT detection methods are based on the golden model of circuit design. Further, some approaches require test pattern for HTs activation. In this paper, we propose SC-COTD (Sequential/Combinational Controllability and Observability features for hardware Trojan Detection), an effective hardware Trojan detection to get rid of both golden chip and test pattern limitations. SC-COTD uses both sequential and combinational testability measures to detect and locate HT signals by a machine learning approach. This method deploys an ensemble classifier based on k-means clustering. The clustering models have diverse variety in testability features along with size of clustering which inspect and reveal different aspects of netlist conventional for a collaborative scheme. The clustering results are filtered and then fed into a decision-making procedure based on majority voting to eliminate the limited flaws of each model. The evaluation results on TrustHUB benchmarks demonstrate that, SC-COTD can detect and locate HTs with 100% without any false negative, i.e., Recall = 1. Although our method has a limited number of false positive, it has the best performance in comparison to well-known previous approaches.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Controllability and observability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware testability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">K -means clustering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware Trojan detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hardware security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mokhtarpour, Azadeh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shafieinejad, Alireza</subfield><subfield code="0">(orcid)0000-0002-2449-2914</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of electronic testing</subfield><subfield code="d">Springer US, 1990</subfield><subfield code="g">37(2021), 4 vom: Aug., Seite 473-487</subfield><subfield code="w">(DE-627)130869090</subfield><subfield code="w">(DE-600)1033317-4</subfield><subfield code="w">(DE-576)024991600</subfield><subfield code="x">0923-8174</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:37</subfield><subfield code="g">year:2021</subfield><subfield code="g">number:4</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:473-487</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10836-021-05960-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">37</subfield><subfield code="j">2021</subfield><subfield code="e">4</subfield><subfield code="c">08</subfield><subfield code="h">473-487</subfield></datafield></record></collection>
|
score |
7.400016 |