WCSE 2022 Spring
ISBN: 978-981-18-5852-9 DOI: 10.18178/wcse.2022.04.007

A Novel Method of Fisher Discriminant Analysis for Hardware Trojan Horse Detection

Yannian Wu, Shaobo Zhang, Guohai Fan, Shuming Xu, Yiying Zhang, Su Li

Abstract— With the rise and rapid development of the network, security issues cannot be ignored. At the same time, the hardware Trojan horse to the security of the chip caused a threat. Therefore, for the detection of hardware Trojan horse in the chip, we propose a hardware Trojan horse detection method based on Fisher discriminant analysis. This method combines the discrimination ability and uses Fisher classification algorithm to extract the small difference between information, so as to realize the detection of hardware Trojan horse. However, in practice, the interference of data and the area of Trojan horse will affect the discrimination results. We conduct discriminant analysis on the number of sample chips. The analysis shows that the proposed method can effectively detect hardware Trojan horse to verify the effectiveness of the method.

Index Terms— hardware trojan horse, discriminant analysis, fisher classification algorithm

Yannian Wu
China Gridcom Co., Ltd, China
Shaobo Zhang
China Gridcom Co., Ltd, China
Guohai Fan
China Gridcom Co., Ltd, China
Shuming Xu
China Gridcom Co., Ltd, China
Yiying Zhang
College of Artificial Intelligence, Tianjin University of Science & Technology, China
Su Li
College of Artificial Intelligence, Tianjin University of Science & Technology, China

[Download]


Cite: Yannian Wu, Shaobo Zhang, Guohai Fan, Shuming Xu, Yiying Zhang, Su Li, "A Novel Method of Fisher Discriminant Analysis for Hardware Trojan Horse Detection," WCSE 2022 Spring Event: 2022 9th International Conference on Industrial Engineering and Applications, pp. 54-60, Sanya, China, April 15-18, 2022.