
between business operators and the bottleneck in the
supply chain can be visualized. However, collecting
standardized and reliable information from multiple
business operators is difficult in the real world.
5 CONCLUSION
In this paper, we focus on the demand and aware-
ness of security assessment for hardware designs in
industries. First, we propose a repository opera-
tion scheme to share security assessment results with
inter-companies. Next, we design questionnaires to
confirm the needs, effectiveness, and concerns based
on the repository operation scheme and summarize
the results of the questionnaires.
From the survey, we found that HT detection
methods are attractive for protecting semiconductor
supply chains. However, the barriers to implementing
HT detection in industries lie in commercialization
and in cultivating awareness of security in the indus-
try. Specifically, identifying counterfeit products and
covering the whole supply chain are expected. For ex-
pectations, future work should cover the whole supply
chain and clarify the benefits of the scheme in indus-
tries.
ACKNOWLEDGMENTS
The questionnaire survey was conducted by Omdia,
a part of Informa Tech as a consulting project for
KDDI Research, Inc. in 2022. The copyright of
the original questionnaire survey belongs to Omdia.
The results reported in this paper were obtained from
“The Contract of Research for Detection Techniques
of Hardware Vulnerabilities” (Ministry of Internal Af-
fairs and Communication, Japan in FY2022).
REFERENCES
Almeida, F., Imran, M., Raik, J., and Pagliarini, S. (2022).
Ransomware attack as hardware trojan: A feasibility
and demonstration study. IEEE Access, 10:44827–
44839.
Chang, S. E. and Chen, Y. (2020). When blockchain meets
supply chain: A systematic literature review on cur-
rent development and potential applications. IEEE Ac-
cess, 8:62478–62494.
Dong, C., Liu, Y., Chen, J., Liu, X., Guo, W., and Chen,
Y. (2020). An unsupervised detection approach for
hardware trojans. IEEE Access, 8:158169–158183.
Francq, J. and Frick, F. (2015). Introduction to hardware
trojan detection methods. In 2015 Design, Automa-
tion & Test in Europe Conference Exhibition (DATE),
pages 770–775.
Hasegawa, K., Yamashita, K., Hidano, S., Fukushima, K.,
Hashimoto, K., and Togawa, N. (2023). Node-wise
hardware trojan detection based on graph learning.
IEEE Transactions on Computers, pages 1–13.
Hasegawa, K., Yanagisawa, M., and Togawa, N. (2017a).
Hardware trojans classification for gate-level netlists
using multi-layer neural networks. In Proc. IEEE In-
ternational Symposium on On-Line Testing and Ro-
bust System Design (IOLTS), pages 227–232.
Hasegawa, K., Yanagisawa, M., and Togawa, N. (2017b).
Trojan-feature extraction at gate-level netlists and its
application to hardware-trojan detection using random
forest classifier. In Proc. IEEE International Sympo-
sium on Circuits and Systems (ISCAS), pages 1–4.
Huang, Z., Wang, Q., Chen, Y., and Jiang, X. (2020). A
survey on machine learning against hardware trojan
attacks: Recent advances and challenges. IEEE Ac-
cess, 8:10796–10826.
Li, S., Zhang, Y., Chen, X., Ge, M., Mao, Z., and Yao, J.
(2020). A xgboost based hybrid detection scheme for
gate-level hardware trojan. In Proc. IEEE Joint Inter-
national Information Technology and Artificial Intel-
ligence Conference (ITAIC), volume 9, pages 41–47.
Oya, M., Shi, Y., Yanagisawa, M., and Togawa, N. (2015).
A score-based classification method for identifying
hardware-trojans at gate-level netlists. In 2015 De-
sign, Automation & Test in Europe Conference & Ex-
hibition (DATE), pages 465–470.
Salmani, H. (2017). Cotd: Reference-free hardware trojan
detection and recovery based on controllability and
observability in gate-level netlist. IEEE Transactions
on Information Forensics and Security, 12:338–350.
Tebyanian, M., Mokhtarpour, A., and Shafieinejad, A.
(2021). Sc-cotd: hardware trojan detection based on
sequential/combinational testability features using en-
semble classifier. J. Electron. Test., 37(4):473–487.
Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., and Tehra-
nipoor, M. (2016). Hardware trojans: Lessons learned
after one decade of research. ACM Transactions on
Design Automation of Electronic Systems, 22.
Yang, Y., Ye, J., Cao, Y., Zhang, J., Li, X., Li, H., and
Hu, Y. (2020). Survey: Hardware trojan detection
for netlist. In 2020 IEEE 29th Asian Test Symposium
(ATS), pages 1–6.
Yu, S.-Y., Yasaei, R., Zhou, Q., Nguyen, T., and Faruque,
M. A. A. (2021). Hw2vec: a graph learning tool for
automating hardware security. In 2021 IEEE Interna-
tional Symposium on Hardware Oriented Security and
Trust (HOST). IEEE.
Zhang, W., Liu, Y., Jiang, L., Shah, N., Fei, X., and Cai,
H. (2019). The construction of a domain knowledge
graph and its application in supply chain risk analy-
sis. In IEEE International Conference on E-Business
Engineering, pages 464–478.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
410