JOURNAL ARTICLE

Hardware trojan detection for gate-level ICs using signal correlation based clustering

Burçin ÇakırSharad Malik

Year: 2015 Journal:   Design, Automation, and Test in Europe Pages: 471-476

Abstract

Malicious tampering of the internal circuits of ICs can lead to detrimental results. Insertion of Trojan circuits may change system behavior, cause chip failure or send information to a third party. This paper presents an information-theoretic approach for Trojan detection. It estimates the statistical correlation between the signals in a design, and explores how this estimation can be used in a clustering algorithm to detect the Trojan logic. Compared with the other algorithms, our tool does not require extensive logic analysis. We neither need the circuit to be brought to the triggering state, nor the effect of the Trojan payload to be propagated and observed at the output. Instead we leverage already available simulation data in this information-theoretic approach. We conducted experiments on the TrustHub benchmarks to validate the practical efficacy of this approach. The results show that our tool can detect Trojan logic with up to 100% coverage with low false positive rates.

Keywords:
Hardware Trojan Trojan Cluster analysis Leverage (statistics) Computer science Logic gate Embedded system Computer engineering Data mining Algorithm Computer security Artificial intelligence

Metrics

64
Cited By
5.11
FWCI (Field Weighted Citation Impact)
18
Refs
0.98
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Integrated Circuits and Semiconductor Failure Analysis
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
VLSI and Analog Circuit Testing
Physical Sciences →  Computer Science →  Hardware and Architecture
© 2026 ScienceGate Book Chapters — All rights reserved.