Core Concepts
This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection as "The Seeker’s Dilemma." The authors aim to create a benchmark that allows for a more accurate evaluation of HT detection methods.
Abstract
"The Seeker's Dilemma" introduces a new approach to HT detection, focusing on creating realistic benchmarks with hidden HTs. The study evaluates existing HT detection tools and highlights the challenges faced in accurately detecting HT-infected circuits. By using Principal Component Analysis, the authors analyze the performance of different detection strategies and emphasize the need for diversified datasets to train better HT detectors.
Stats
We use our developed benchmark to evaluate three state-of-the-art HT detection tools.
The dataset is then used to train a binary classifier, which reports all four classification cases.
The PCA algorithm identifies principal components to decrease data dimensionality.
Each circuit has 18 variations of its original HT-free version.