• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, Lihan (Chen, Lihan.) [1] | Dong, Chen (Dong, Chen.) [2] | Wu, Qiaowen (Wu, Qiaowen.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] | Guo, Xiaodong (Guo, Xiaodong.) [5] | Chen, Zhenyi (Chen, Zhenyi.) [6] | Zhang, Hao (Zhang, Hao.) [7] | Yang, Yang (Yang, Yang.) [8]

Indexed by:

EI

Abstract:

Due to the complexity of integrated circuit design and manufacturing process, an increasing number of third parties are outsourcing their untrusted intellectual property (IP) cores to pursue greater economic benefits, which may embed numerous security issues. The covert nature of hardware Trojans (HTs) poses a significant threat to cyberspace, and they may lead to catastrophic consequences for the national economy and personal privacy. To deal with HTs well, it is not enough to just detect whether they are included, like the existing studies. Same as malware, identifying the attack intentions of HTs, that is, analyzing the functions they implement, is of great scientific significance for the prevention and control of HTs. Based on the fined detection, for the first time, this article proposes a two-stage Graph Neural Network model for HTs' multifunctional classification, GNN4HT. In the first stage, GNN4HT localizes HTs, achieving a notable true positive rate (TPR) of 94.28% on the Trust-Hub dataset and maintaining high performance on the TRTC-IC dataset. GNN4HT further transforms the localization results into HT information graphs (HTIGs), representing the functional interaction graphs of HTs. In the second stage, the dataset is augmented through logical equivalence for training and HT functionalities are classified based on the extracted HTIG from the first stage. For the multifunctional classification of HTs, the correct classification rate reached as high as 80.95% at gate-level and 62.96% at register transfer level. This article marks a breakthrough in HT detection, and it is the first to address the multifunctional classification issue, holding significant practical importance and application prospects. © 1982-2012 IEEE.

Keyword:

Circuit simulation Economic and social effects Hardware security Integrated circuit manufacture Integrated circuits Logic gates Malware Timing circuits

Community:

  • [ 1 ] [Chen, Lihan]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 2 ] [Dong, Chen]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 3 ] [Wu, Qiaowen]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 4 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 5 ] [Guo, Xiaodong]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 6 ] [Chen, Zhenyi]University of South Florida, Department of Computer Science and Engineering, Tampa; FL; 32306, United States
  • [ 7 ] [Zhang, Hao]Fuzhou University, College of Computer and Data Science, Fujian, Fuzhou; 350108, China
  • [ 8 ] [Yang, Yang]Singapore Management University, School of Computing and Information Systems, Bras Basah, Singapore

Reprint 's Address:

  • [dong, chen]fuzhou university, college of computer and data science, fujian, fuzhou; 350108, china;;

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

ISSN: 0278-0070

Year: 2025

Issue: 1

Volume: 44

Page: 172-185

2 . 7 0 0

JCR@2023

CAS Journal Grade:3

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:30/10139108
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1