Trust-Hub Trojan Benchmark for Hardware Trojan Detection Model Creation using Machine Learning

Citation Author(s):
Hassan
Salmani
Howard University
Mark
Tehranipoor
University of Florida
Sarwono
Sutikno
Institut Teknologi Bandung
Fajar
Wijitrisnanto
Institut Teknologi Bandung
Submitted by:
Fajar Wijitrisnanto
Last updated:
Thu, 09/08/2022 - 04:18
DOI:
10.21227/px6s-sm21
Data Format:
Research Article Link:
Links:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

This abstract is based on the work described in the paper (submitted for IEEE Access review) titled "Evaluation of Machine Learning Model Improvement for Hardware Trojan Early Detection on Register Transfer Level Design Using Verilog/VHDL Code Branching Features". The submited dateset consist of 32 different trojan-inserted IP cores design. For each IP core design, the dataset provides some files that contain source code written in VHDL or Verilog design language. Some of the functions inside those files are malicious and some of them are clean. The malicious functions usually appear inside a conditional statement that rarely executed. That's why we extract machine learning feature from those conditional statements.

Instructions: 

The .xlsx file submitted here (zipped, titled "Benchmark Feature Extraction") contains the result of feature extraction from all conditional statements for each IP cores dataset. This feature extraction process is related to the work described in the manuscript titled "Evaluation of Machine Learning Model Improvement for Hardware Trojan Early Detection on Register Transfer Level Design Using Verilog/VHDL Code Branching Features". You could also extract those features yourself using method described in Chapter IV.A. from the manuscript. To give labels (Trojan/Non-trojan) for each conditional statement branching, you could use Figure 6 from manuscript as reference.

Funding Agency: 
P3MI

Comments

.

Submitted by J A on Mon, 03/11/2024 - 15:02

Documentation

AttachmentSize
File Readme.txt605 bytes