JOURNAL ARTICLE

Gate-Level Hardware Trojan Detection Method for Graph Neural Networks Based on Controllability Metrics

Yang ZHANG, Chang LIU, Shaoqing LI

Year: 2024 Journal:   DOAJ (DOAJ: Directory of Open Access Journals)

Abstract

With the continuous increase in globalization, third-party Intellectual Property (IP) core applications have become increasingly widespread. The gradual maturity of hardware Trojan attack technology enables the implantation of hardware Trojan in the chip design process, posing a serious threat to chip design security. Hardware Trojan detection methods proposed in the current study have the following drawbacks: they rely on golden reference circuits, require complete test patterns, and require a large number of samples for learning. This study proposes a graph neural network detection method based on controllability metrics for the hardware Trojan detection requirements of IP cores. This method uses a gate-level netlist as the input and first uses controllability values as guidance to obtain suspicious gate nodes to narrow the search range. Subsequently, the suspicious gate nodes are generated into corresponding subgraphs, and the graph convolutional neural network is used to extract features from the subgraphs. Thus, it detects the subgraphs and ultimately identifies the existence of hardware Trojans. The experimental results demonstrate that the proposed method does not require testing patterns and golden models. By combining the hidden characteristics and structural features of hardware Trojans, the detection accuracy is improved. The average True Positive Rate(TPR) and False Positive Rate(FPR) are 100% and 0.75%, respectively. Additionally, it effectively reduces the FPR and achieve satisfactory detection results while ensuring a high TPR.

Keywords:
Trojan Hardware Trojan Netlist Controllability Artificial neural network Convolutional neural network Graph

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.57
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Low-power high-performance VLSI design
Physical Sciences →  Engineering →  Electrical and Electronic Engineering

Related Documents

JOURNAL ARTICLE

A fine-grained detection method for gate-level hardware Trojan based on bidirectional Graph Neural Networks

Dong ChengChen DongWenwu HeZhenyi ChenXimeng LiuHao Zhang

Journal:   Journal of King Saud University - Computer and Information Sciences Year: 2023 Vol: 35 (10)Pages: 101822-101822
JOURNAL ARTICLE

Hardware Trojan detection based on graph neural networks

Xiao WeiTianming WangLI QingFazhan Zhao

Journal:   Integration Year: 2025 Vol: 103 Pages: 102432-102432
JOURNAL ARTICLE

Hardware Trojan Detection Using Graph Neural Networks

Rozhin YasaeiLiming ChenShih-Yuan YuMohammad Abdullah Al Faruque

Journal:   IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Year: 2022 Vol: 44 (1)Pages: 25-38
© 2026 ScienceGate Book Chapters — All rights reserved.