scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Proceedings ArticleDOI
26 May 2019
TL;DR: An ensemble-learning-based hardware-Trojan detection method by detecting the Trigger nets at the gate level by extracting the Trigger-net features for each net from known netlists and using the ensemble learning method to train two detection models according to the Trojan types.
Abstract: With the globalization of integrated circuit (IC) design and manufacturing, malicious third-party vendors can easily insert hardware Trojans into their intellect property (IP) cores during IC design phase, threatening the security of IC systems. It is strongly required to develop hardware-Trojan detection methods especially for the IC design phase. As the particularity of Trigger nets in Trojan circuits, in this paper, we propose an ensemble-learning-based hardware-Trojan detection method by detecting the Trigger nets at the gate level. We extract the Trigger-net features for each net from known netlists and use the ensemble learning method to train two detection models according to the Trojan types. The detection models are used to identify suspicious Trigger nets in an unknown detected netlist and give results of suspiciousness values for each detected net. By flagging the top n% suspicious nets of each detection model as the suspicious Trigger nets based on the suspiciousness values, the proposed method can achieve, on average, 88% true positive rate, 90% true negative rate, and 90% Accuracy.

13 citations

Proceedings ArticleDOI
26 Mar 2018
TL;DR: This paper proposes a hardware-Trojan classification method utilizing boundary net structures and demonstrates that this method outperforms an existing machine-learning-based hardware- Trojan detection method in terms of true positive rate.
Abstract: Recently, cybersecurity has become a serious concern for us. For example, the threats of hardware Trojans (malfunctions inserted into hardware devices) have appeared. Since hardware vendors often outsource parts of their hardware products to third-party vendors, the risk of hardware-Trojan insertion has been increased. Especially in the hardware design step, malicious vendors have a chance to insert hardware Trojans easily. In this paper, we propose a hardware-Trojan classification method utilizing boundary net structures. To begin with, we use a machine-learning-based hardware-Trojan detection method and classify the nets in a given netlist into a set of normal nets and that of Trojan nets. Based on the classification, we investigate the nets around the boundary between normal nets and Trojan nets and extract the features of the nets identified to be normal nets or Trojan nets mistakenly. Finally, using the classification results of machine-learning-based hardware-Trojan detection and the extracted features of the boundary nets, we classify the nets in a given netlist into a set of normal nets and that of Trojan nets again. The experimental results demonstrate that our method outperforms an existing machine-learning-based hardware-Trojan detection method in terms of true positive rate.

13 citations

Patent
21 Oct 2009
TL;DR: In this paper, a method and a device for detecting web trojans is presented, which consists of a script information acquisition module, a behavior characteristic extraction module and a web Trojan characteristic matching module.
Abstract: The invention discloses a method and a device for detecting web Trojan. The technical proposal comprises the steps of obtaining html webpage script information from a webpage; executing the html webpage script information and recording behavior characteristics generated in the process of execution; matching the behavior characteristics with stored bug feature codes, and when matching is successful, determining the webpage content contains the web Trojan. The device comprises: a script information acquisition module, a behavior characteristic extraction module and a web Trojan characteristic matching module. The technical proposal can be adopted to comparatively comprehensively detect the web Trojan and overcome the problem of detection limitation caused by relying on the third party software in the prior art.

13 citations

Journal ArticleDOI
TL;DR: In this paper, the authors proposed HTDet, a novel HT detection method using information entropy-based clustering and developed a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan logics.

13 citations

Journal ArticleDOI
TL;DR: An HT detection method by analyzing the combined structural features of HTs and host circuits that can successfully detect all stealth Trojans with runtime within 72 s on a platform with an AMD 2.00-GHz CPU with 4-GB RAM and a low false positive rate.
Abstract: Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission-critical applications. This paper proposes an HT detection method by analyzing the combined structural features of HTs and host circuits. The structural features of combinational and sequential logic HTs are extracted and form an HT feature database. An efficient quantization approach on feature matching is proposed to search the features from circuit designs. The experiments conducted on TrustHub benchmarks show that the proposed method can successfully detect all stealth Trojans with runtime within 72 s on a platform with an AMD 2.00-GHz CPU with 4-GB RAM and a low false positive rate compared with the existing methods.

13 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168