首页|Hardware Trojan Detection Methods for Gate-Level Netlists Based on Graph Neural Networks

Hardware Trojan Detection Methods for Gate-Level Netlists Based on Graph Neural Networks

扫码查看
Currently, untrusted third-party entities are increasingly involved in various stages of IC design and manufacturing, posing a significant threat to the reliability and security of SoCs due to the presence of hardware Trojans (HTs). In this paper, gate-level HT detection methods based on graph neural networks (GNNs) are established to overcome the defects of existing machine learning, which makes it difficult to characterize circuit connection relationships. We introduce harmonic centrality in the feature engineering of gate-level HT detection, which reflects the positional information of nodes and their adjacent nodes in the graph, thereby enhancing the quality of feature engineering. We use the golden section weight optimization algorithm to configure penalty weights to alleviate the problem of extreme data imbalance. In the SAED database, GraphSAGE-LSTM model obtained a TPR of 88.06% and an average F1 score of 90.95%. In the combined HT netlist of LEDA datasets, GraphSAGE-POOL model obtains a TPR of 88.50% and the best F1 score of 92.17%. In sequential HT netlist, GraphSAGE-LSTM model performs optimally, with a TPR of 98.25% and an average F1 score of 98.59%. Compared to existing detection models, the F1 score is enhanced by 8.86% and 2.48% on combined and sequential HT datasets, respectively.

Feature extractionLogic gatesHardwareTrojan horsesGraph neural networksIntegrated circuit modelingStandardsSecurityIntegrated circuitsComputers

Peijun Ma、Jie Li、Hongjin Liu、Jiangyi Shi、Shaolin Zhang、Weitao Pan、Yue Hao

展开 >

State Key Discipline Laboratory of Wide Bandgap Semiconductor Technology, School of Microelectronics, Xidian University, Xi’an, China

Beijing SunWise Space Technology Ltd., Beijing, China

State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China

2025

IEEE transactions on computers

IEEE transactions on computers

ISSN:
年,卷(期):2025.74(5)
  • 29