Score: 1

Automated Hardware Trojan Insertion in Industrial-Scale Designs

Published: November 11, 2025 | arXiv ID: 2511.08703v1

By: Yaroslav Popryho, Debjit Pal, Inna Partin-Vaisband

Potential Business Impact:

Creates fake computer bugs to test security.

Business Areas:
Application Specific Integrated Circuit (ASIC) Hardware

Industrial Systems-on-Chips (SoCs) often comprise hundreds of thousands to millions of nets and millions to tens of millions of connectivity edges, making empirical evaluation of hardware-Trojan (HT) detectors on realistic designs both necessary and difficult. Public benchmarks remain significantly smaller and hand-crafted, while releasing truly malicious RTL raises ethical and operational risks. This work presents an automated and scalable methodology for generating HT-like patterns in industry-scale netlists whose purpose is to stress-test detection tools without altering user-visible functionality. The pipeline (i) parses large gate-level designs into connectivity graphs, (ii) explores rare regions using SCOAP testability metrics, and (iii) applies parameterized, function-preserving graph transformations to synthesize trigger-payload pairs that mimic the statistical footprint of stealthy HTs. When evaluated on the benchmarks generated in this work, representative state-of-the-art graph-learning models fail to detect Trojans. The framework closes the evaluation gap between academic circuits and modern SoCs by providing reproducible challenge instances that advance security research without sharing step-by-step attack instructions.

Country of Origin
🇺🇸 United States

Page Count
7 pages

Category
Computer Science:
Cryptography and Security