Automated Hardware Trojan Insertion in Industrial-Scale Designs
Popryho, Yaroslav, Pal, Debjit, Partin-Vaisband, Inna
–arXiv.org Artificial Intelligence
Abstract--Industrial Systems-on-Chips (SoCs) often comprise hundreds of thousands to millions of nets and millions to tens of millions of connectivity edges, making empirical evaluation of hardware-Trojan (HT) detectors on realistic designs both necessary and difficult. Public benchmarks remain significantly smaller and hand-crafted, while releasing truly malicious RTL raises ethical and operational risks. This work presents an automated and scalable methodology for generating HT -like patterns in industry-scale netlists whose purpose is to stress-test detection tools without altering user-visible functionality. The pipeline (i) parses large gate-level designs into connectivity graphs, (ii) explores rare regions using SCOAP testability metrics, and (iii) applies parameterized, function-preserving graph transformations to synthesize trigger-payload pairs that mimic the statistical footprint of stealthy HTs. When evaluated on the benchmarks generated in this work, representative state-of-the-art graph-learning models fail to detect Trojans. The framework closes the evaluation gap between academic circuits and modern SoCs by providing reproducible challenge instances that advance security research without sharing step-by-step attack instructions.
arXiv.org Artificial Intelligence
Nov-13-2025
- Country:
- Asia
- Japan > Honshū
- Kansai > Kyoto Prefecture
- Kyoto (0.04)
- Tōhoku > Fukushima Prefecture
- Fukushima (0.04)
- Kansai > Kyoto Prefecture
- Middle East > Iran
- Tehran Province > Tehran (0.04)
- Japan > Honshū
- Europe (0.04)
- North America > United States
- Illinois > Cook County > Chicago (0.04)
- Asia
- Genre:
- Research Report (0.50)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology: