Skip to Content

Introducing SALTY an Explainable AI for Hardware Trojan Detection

Combating the Threat of Hardware Trojans in the Distributed Supply Chain

Get All The Latest Research & News!

Thanks for registering!

In an era defined by globally distributed supply chains and the increasing reliance on third-party intellectual property (IP) in semiconductor design, the threat of maliciously inserted hardware Trojans looms large. 

These subtle modifications can lead to devastating consequences in critical systems, ranging from information leakage to denial-of-service, potentially endangering human lives and causing significant financial losses. Detecting these stealthy threats in complex hardware presents a formidable challenge. 

This research introduces SALTY (Structural AI for Explainable Trojan Analysis), a novel framework that leverages a Graph Neural Network (GNN) with a Jumping Knowledge (JK) mechanism for initial predictions and employs Explainable Artificial Intelligence (XAI) for refining these outcomes through dynamic post-processing. 

Current approaches often suffer from scalability issues and high false positive rates. SALTY aims to overcome the limitations of existing hardware Trojan detection techniques by providing both high detection accuracy and insights into the decision-making process. SALTY potentially represents a significant step towards building more secure and trustworthy hardware systems.

Key Takeaways

  • Demonstrates superior detection with > 98% True Positive Rate (TPR) and True Negative Rate (TNR) on standard benchmarks, significantly outperforming alternative methods.

  • Exhibits robust generalization to entirely unseen digital designs without prior exposure to similar structures. This addresses a critical limitation of many existing methods that are often trained and tested on similar circuit families, leading to overestimation of their real-world applicability.

  • The integration of Explainable AI (XAI) techniques provides insights into the AI model's decision-making process, allowing for the development of a dynamic post-processing module that minimizes "AI hallucinations" and further enhances detection performance.

  • Through XAI, it can identify specific structural features, such as the prevalence and connectivity of AND gates in the local neighborhood of a wire, that are highly indicative of Trojan presence.

  • The SALTY framework is implemented as a highly parameterized tool and integrated into the Electronic Design Automation (EDA) flow, suggesting its potential for practical adoption in the semiconductor industry.

Overview

The increasing complexity and globalization of the semiconductor supply chain have introduced significant security vulnerabilities, with hardware Trojans being a primary concern. These intentional malicious modifications can be introduced by various untrusted entities, including third-party IP vendors, rogue employees, and untrusted foundries. 

Due to their small footprint and infrequent triggering, hardware Trojans are notoriously difficult to detect using traditional testing methods.

In response to this challenge, researchers have explored the use of Artificial Intelligence (AI) techniques for automated detection. Graph Neural Networks (GNNs) have emerged as a promising approach due to their ability to represent the structural connectivity as graphs, allowing for the identification of anomalous patterns indicative of Trojan insertion. 

However, many existing AI-based methods suffer from limitations such as low detection rates, instability across different designs, and scalability issues arising from evaluation on similar benchmark structures.  The "black-box" nature of many AI models hinders trust and the ability to understand why certain decisions are made.

SALTY addresses these shortcomings by introducing a novel GNN architecture incorporating a Jumping Knowledge (JK) mechanism. GNNs operate by learning representations of nodes in a graph based on their features and the features of their neighbors. 

The JK mechanism enhances this process by aggregating hidden layer embeddings from different layers of the GNN. This prevents the issue of over-smoothing, where node representations become too similar as the network depth increases, allowing the model to capture both local and more global structural information crucial for detecting subtle Trojan patterns. 

To further improve detection accuracy, SALTY incorporates Explainable Artificial Intelligence (XAI). XAI techniques aim to provide insights into the decision-making process of AI models, making them more transparent and understandable. 

SALTY leverages the Captum-Explainer algorithm, utilizing Integrated Gradients, a gradient-based attribution method, to quantify the contribution of each input feature to the model's prediction. This allows for the identification of the most influential structural features that the model uses to classify nodes as either Trojan or non-Trojan.

The insights gained from XAI are then used to build a dynamic post-processing module. Unlike static post-processing techniques in previous works, SALTY's post-processing dynamically adjusts the initial predictions based on the explainability analysis. 

By identifying instances where the AI model might be making incorrect decisions (hallucinations), the post-processing module can refine the outcomes, leading to higher TPR and TNR. Figure 1 from the paper provides a visual overview of the SALTY framework, illustrating the input/output, feature extraction, GNN with JK mechanism, and the explainability-guided post-processing stages.


(Figure 1: The SALTY Framework: input/output, feature extraction, graph neural network, and post-processing.) Note: Placeholder for Figure 1. Image data needed.

Why It's Important

The increasing reliance on globally distributed supply chains for semiconductor manufacturing necessitates robust mechanisms for detecting hardware Trojans. These Trojans can cause serious harm – stealing sensitive data, spying on users, or even completely shutting down essential systems like power grids or medical devices. SALTY offers a promising solution to this pressing security concern.

Existing techniques often suffer from a trade-off between detection rate and false positive rate. A high false positive rate can lead to alert fatigue and increased manual inspection, negating the benefits of automation. SALTY's high TPR and TNR represent a significant improvement, potentially making it more practical for real-world deployment.

The integration of XAI not only improves performance but also provides transparency into the decision-making process. Understanding why a particular connection is classified as a Trojan can increase confidence in the detection framework and provide valuable insights for security analysts. The ability to generate human-readable rules from the model's learning process further enhances interpretability.

Many existing AI-based methods are evaluated on benchmarks that include designs from the same circuit family in both training and testing sets. This can lead to inflated performance metrics and poor generalization to truly unseen designs in the wild. SALTY's evaluation methodology explicitly excludes such benchmarks, demonstrating its ability to detect Trojans in completely new circuit architectures and providing more accurate performance metrics.

Meet SALTY: How it Works

To tackle this hidden threat, researchers have developed a new method called SALTY (Structural AI for Explainable Trojan Analysis). SALTY uses cutting-edge Artificial Intelligence (AI) to hunt down these stealthy Trojans with remarkable accuracy.

Here’s how it works:

  1. Analyzing Connections (GNN + JK): SALTY employs a specialized AI called a Graph Neural Network (GNN). GNNs are excellent at understanding complex relationships, similar to how social networks map connections between people. In this case, the GNN analyzes the intricate wiring diagram of a computer chip. SALTY enhances this with a technique called 'Jumping Knowledge' (JK), allowing the AI to understand both the fine details and the bigger picture of the circuit's structure.

  2. Explaining the 'Why' (XAI): A major problem with some AI is that they act like "black boxes" – giving an answer without explaining how they reached it. SALTY overcomes this using Explainable AI (XAI). This allows SALTY to not only flag a potential Trojan but also show why it thinks a specific part of the circuit is suspicious.

  3. Smarter Checking (Dynamic Post-Processing): The insights from XAI are used to double-check the GNN's initial findings. This "dynamic post-processing" step intelligently refines the results, correcting potential AI mistakes and significantly boosting accuracy.

Summary of Results

SALTY's performance was rigorously evaluated on a large set of standard TrustHub benchmarks (> 15) and compared against seven other state-of-the-art Trojan detection frameworks. Table III summarizes the quantitative comparison, clearly demonstrating that the XAI-enhanced GAT+JK version of SALTY achieved the highest average TPR of 98.47% and TNR of 98.14%, outperforming methods like VIPR, TrojanSAINT, GNN4Gate, GNN4HT, FAST-GO, R-HTDET, and NHTD.

The results also highlight the importance of the Jumping Knowledge mechanism, as the GAT+JK variant consistently outperformed a standard GAT architecture (results shown in the paper but not explicitly in Table III). Furthermore, the dynamic post-processing guided by XAI features further boosted the performance of the GAT+JK model.

Experimentation with different locality sizes (L) for structural feature extraction revealed that a locality of 7 achieved the best balance between capturing sufficient context and avoiding irrelevant information. Table II shows the TPR and TNR for different locality sizes (5, 7, and 10) across several benchmarks, supporting this finding.

Figure 2 provides an illustration of the feature scores obtained using XAI for detecting Trojan nodes in two different benchmarks. This visualization helps understand which structural features are most important for the model's classification of Trojan nodes. For example, in s38417 t200, the presence of AND gates (G2 AND, G3 AND) and their connectivity (Adj-23) were identified as highly influential features.

Figure 3A further illustrates the distribution of feature scores for Trojan and non-Trojan nodes, showing a clear distinction with significantly higher scores for Trojan nodes. Figure 3B delves into the analysis of feature scores for non-Trojan nodes, identifying potential false negatives where some non-Trojan nodes exhibit high feature values similar to Trojan nodes. 

The XAI-guided post-processing then uses thresholds (N and Th) based on these feature scores to reclassify such false negatives as true positives, further enhancing the overall performance.

The human-readable rules generated by the Captum-Explainer, as shown in Table IV, provide valuable insights into the patterns that the AI model learns to associate with Trojan presence. A recurring observation across different benchmarks is the significant influence of AND gates in the local neighborhood of a potentially malicious wire.

Conclusion

The SALTY framework presents a significant advancement in the field of hardware Trojan detection. By combining a novel GNN architecture with a Jumping Knowledge mechanism and an explainability-guided dynamic post-processing module, SALTY effectively addresses the limitations of existing state-of-the-art techniques. 

The framework achieves superior detection accuracy, demonstrates robust generalization to unseen designs, and provides valuable insights into the decision-making process through XAI. The identification of important structural features and the generation of human-readable rules further enhance the practical utility and trustworthiness of SALTY. 

Future research directions include extending SALTY's capabilities to detect other hardware security threats such as side-channel leakage and fault injection vulnerabilities. The integration of SALTY into the EDA flow suggests its potential for real-world impact in ensuring the security and trustworthiness of modern electronics.

Publication Title: SALTY: Explainable Artificial Intelligence Guided Structural Analysis for Hardware Trojan Detection
Research Categories:
Computer Science Artificial Intelligence
Preprint Date: 2025-02-19
Number of Pages: 7
Publication Links:
Sign in to leave a comment
Enhancing Automated Grading with Human Insight: The GradeHITL Framework
Advances in Artificial Intelligence Assisted Grading Technologies