GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs

  • Daehyeon Lee
  • , Junghee Lee*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Hardware Trojans (HTs) are malicious circuits covertly embedded in hardware, similar to software backdoors, that can cause malfunctions or leak confidential information when activated. Detecting and localizing these HTs is critical, especially in sensitive systems like weaponry, where they pose significant security threats. Traditional detection methods often rely on side-channel analysis, which requires specialized equipment and expertise, making them costly and limited to post-manufacturing stages. Localization is crucial because merely detecting an HT does not allow for effective neutralization. Pinpointing the exact location helps in assessing the impact, facilitating targeted removal, and avoiding costly hardware redesigns. In critical applications like military systems, this minimizes the risk of security breaches that could compromise the entire system. This paper proposes a novel method for HT detection and localization using a Graph Autoencoder (GAE). Unlike existing techniques, our approach utilizes the structural information in Data Flow Graphs (DFGs) to identify HTs without the need for labeled datasets or manual feature engineering. By training solely on the Golden Model (GM) of the hardware design, the GAE captures the circuit's normal structural patterns. Our method analyzes the reconstruction error of each node in the GAE to not only detect the presence of HTs but also accurately pinpoint their insertion points within the hardware design. Experimental results show that our method outperforms existing approaches across various benchmarks, achieving high detection accuracy. It also offers practical advantages by avoiding the need for additional equipment or HT data during training, making it a feasible solution for early HT detection and mitigation in hardware systems.

Original languageEnglish
Title of host publicationACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1175-1187
Number of pages13
ISBN (Electronic)9798400714108
DOIs
Publication statusPublished - 2025 Aug 24
Event20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025 - Hanoi, Viet Nam
Duration: 2025 Aug 252025 Aug 29

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
Country/TerritoryViet Nam
CityHanoi
Period25/8/2525/8/29

Bibliographical note

Publisher Copyright:
© 2025 Copyright held by the owner/author(s).

Keywords

  • Data flow graph
  • Gate-level
  • Hardware trojan
  • Machine learning
  • Neural network algorithm
  • RTL
  • Trojan detection

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs'. Together they form a unique fingerprint.

Cite this