%P 105-110 %T Net Classification Based on Testability and Netlist Structural Features for Hardware Trojan Detection %A C.H. Kok %A C.Y. Ooi %A M. Inoue %A M. Moghbel %A S. Baskara Dass %A H.S. Choo %A N. Ismail %A F.A. Hussin %I IEEE Computer Society %V 2019-D %O cited By 16; Conference of 28th IEEE Asian Test Symposium, ATS 2019 ; Conference Date: 10 December 2019 Through 13 December 2019; Conference Code:156685 %J Proceedings of the Asian Test Symposium %L scholars11019 %D 2019 %R 10.1109/ATS47505.2019.00020 %X As integrated chip (IC) is one of the most essential components for communication devices, enhancing the integrity of hardware security is essential to prevent any security breach. Implantation of Hardware Trojan (HT) into the IC is one of the most threatening hardware security risks since most of the IC design and fabrication phases are outsourced to third-party foundries. Gate-level netlist inspection is utterly important as HT could be easily hidden among the primitives of the circuit which makes the detection challenging. Previously, HT detection methods for gate-level netlist were mainly based on either net testability or net's structural features. In this paper, we proposed to consolidate these two types of features into a single feature vector to train supervised machine learning classifiers. We also analyzed the performance of the classifiers based on different combinations of features using Minimum Redundancy and Maximum Relevance (mRMR) technique. Using the best feature combination, we achieved a 99.85 True Positive Rate (TPR), 99.95 True Negative Rate (TNR) and 99.90 accuracy (ACC). The results were validated using 10-fold cross-validation. © 2019 IEEE. %K Feature extraction; Integrated circuits; Machine learning; Supervised learning, 10-fold cross-validation; Communication device; Feature combination; Hardware Trojan detection; Netlist; Supervised machine learning; True negative rates; True positive rates, Hardware security