Abstract
Hardware Trojans (HTs) are malicious circuits covertly embedded in hardware, similar to software backdoors, that can cause malfunctions or leak confidential information when activated. Detecting and localizing these HTs is critical, especially in sensitive systems like weaponry, where they pose significant security threats. Traditional detection methods often rely on side-channel analysis, which requires specialized equipment and expertise, making them costly and limited to post-manufacturing stages. Localization is crucial because merely detecting an HT does not allow for effective neutralization. Pinpointing the exact location helps in assessing the impact, facilitating targeted removal, and avoiding costly hardware redesigns. In critical applications like military systems, this minimizes the risk of security breaches that could compromise the entire system. This paper proposes a novel method for HT detection and localization using a Graph Autoencoder (GAE). Unlike existing techniques, our approach utilizes the structural information in Data Flow Graphs (DFGs) to identify HTs without the need for labeled datasets or manual feature engineering. By training solely on the Golden Model (GM) of the hardware design, the GAE captures the circuit's normal structural patterns. Our method analyzes the reconstruction error of each node in the GAE to not only detect the presence of HTs but also accurately pinpoint their insertion points within the hardware design. Experimental results show that our method outperforms existing approaches across various benchmarks, achieving high detection accuracy. It also offers practical advantages by avoiding the need for additional equipment or HT data during training, making it a feasible solution for early HT detection and mitigation in hardware systems.
| Original language | English |
|---|---|
| Title of host publication | ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery |
| Pages | 1175-1187 |
| Number of pages | 13 |
| ISBN (Electronic) | 9798400714108 |
| DOIs | |
| Publication status | Published - 2025 Aug 24 |
| Event | 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025 - Hanoi, Viet Nam Duration: 2025 Aug 25 → 2025 Aug 29 |
Publication series
| Name | Proceedings of the ACM Conference on Computer and Communications Security |
|---|---|
| ISSN (Print) | 1543-7221 |
Conference
| Conference | 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025 |
|---|---|
| Country/Territory | Viet Nam |
| City | Hanoi |
| Period | 25/8/25 → 25/8/29 |
Bibliographical note
Publisher Copyright:© 2025 Copyright held by the owner/author(s).
Keywords
- Data flow graph
- Gate-level
- Hardware trojan
- Machine learning
- Neural network algorithm
- RTL
- Trojan detection
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS