Our proposed hardware trojan detection and explanation framework. Credit: IEEE Access (2025). DOI: 10.1109/access.2025.3592030
University of Missouri researchers have used artificial intelligence to detect hidden hardware trojans through a method that’s 97% accurate.
From smartphones to medical devices, computer chips power nearly everything we use today. But hidden deep inside these chips, there’s a little-known threat: hardware trojans—malicious modif…
Our proposed hardware trojan detection and explanation framework. Credit: IEEE Access (2025). DOI: 10.1109/access.2025.3592030
University of Missouri researchers have used artificial intelligence to detect hidden hardware trojans through a method that’s 97% accurate.
From smartphones to medical devices, computer chips power nearly everything we use today. But hidden deep inside these chips, there’s a little-known threat: hardware trojans—malicious modifications to a chip’s design that can steal data, weaken security and sabotage systems.
Traditionally, detecting hardware trojans has been an expensive, time-consuming and complicated process. Now, University of Missouri researchers are introducing a new artificial intelligence-driven method to find these threats faster and more easily than before, said Ripan Kumar Kundu, a doctoral candidate in Mizzou’s College of Engineering.
In a project led by Kundu, Mizzou’s team is leveraging existing large language models—the same type of AI that powers popular chatbots—to scan chip designs for hidden threats. The method doesn’t just identify suspicious lines of code with 97% accuracy; it also explains why it’s malicious, making the process more transparent.
The project is detailed in the study “PEARL: An adaptive and explainable hardware trojan detection using open source and enterprise large language models,” which is published in IEEE Access.
“That explanation is critical because it saves developers from digging through thousands of lines of code,” Kundu said. “We’re making the process faster, clearer and more trustworthy.”
The system is flexible, too: It can run on local machines or through cloud services, making it useful for both open-source developers and large companies. It can also be integrated into chip-design processes across multiple industries, including consumer electronics, health care, finance and defense.
Why it matters
Unlike software viruses, hardware trojans can’t be removed once the chip is made. They go undetected until triggered by an attacker, and the results can be devastating—devices can malfunction, leak sensitive data or even disrupt national defense systems.
Because these chips are designed and built through a global supply chain, trojans can be added at almost any stage of production, making it difficult to identify them. Mizzou’s approach offers big advantages for the industries involved in this production pipeline. By catching trojans early, companies can avoid the huge financial and reputational damage of discovering them later, which leads to costly recalls of chips or destroyed products.
“These chips are the foundation of our digital world,” Khurram Khalil, a doctoral candidate in Mizzou’s College of Engineering and co-author of the study, said. “By combining the power of artificial intelligence with an understandable explanation, we’re building tools to protect that foundation at every step of the supply chain.”
The Mizzou team is also developing ways to automatically fix chips in real time, which can help prevent problems before they ever reach production. In addition, researchers see the potential for their method to help secure other critical systems, such as power grids and infrastructure.
More information: Ripan Kumar Kundu et al, PEARL: An Adaptive and Explainable Hardware Trojan Detection Using Open Source and Enterprise Large Language Models, IEEE Access (2025). DOI: 10.1109/access.2025.3592030
Citation: AI-powered method helps protect global chip supply chains from cyber threats (2025, October 13) retrieved 13 October 2025 from https://techxplore.com/news/2025-10-ai-powered-method-global-chip.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.