首页> 外文会议>International Conference on Information and Communications Security >Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation
【24h】

Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation

机译:基于机器学习的硬件木马检测电磁散发

获取原文

摘要

The complexity and outsourcing trend of modern System-on-Chips (SoC) has made Hardware Trojan (HT) a real threat for the SoC security. In the state-of-the-art, many techniques have been proposed in order to detect the HT insertion. Side-channel based methods emerge as a good approach used for the HT detection. They can extract any difference in the power consumption, electromagnetic (EM) emanation, delay propagation, etc. caused by the HT insertion/modification in the genuine design. Therefore, they can be applied to detect the HT even when it is not activated. However, these methods are evaluated on overly simple design prototypes such as AES coprocessors. Moreover, the analytical approach used for these methods is limited by some statistical metrics such as the direct comparison of EM traces or the T-test coefficients. In this paper, we propose two new detection methodologies based on Machine Learning algorithms. The first method consists in applying the supervised Machine Learning (ML) algorithms on raw EM traces for the classification and detection of HT. It offers a detection rate close to 90% and false negative smaller than 5%. For the second method, we propose a method based on the Outlier/Novelty algorithms. This method combined with the T-test based signal processing technique, when compared with state-of-the-art, offers a better performance with a detection rate close to 100% and a false positive smaller than 1%. We have evaluated the performance of our method on a complex target design: RISC-V generic processors. The three HTs with the corresponding sizes of 0.53%, 0.27% and 0.1% of the RISC-V processors are inserted for the experimentation. The experimental results show that the inserted HTs, though minimalist, can be detected using our new methodology.
机译:现代系统芯片(SoC)的复杂性和外包趋势使硬件特洛伊木马(HT)对SoC安全的真正威胁。在现有技术中,已经提出了许多技术以检测HT插入。基于侧通道的方法作为用于HT检测的良好方法。它们可以提取由正版设计中的HT插入/修改引起的功耗,电磁(EM)发射,延迟传播等的任何差异。因此,即使没有激活,它们也可以应用于检测HT。但是,这些方法在过度简单的设计原型上进行了评估,例如AES协处理器。此外,用于这些方法的分析方法受到一些统计指标的限制,例如EM迹线或T-TEST系数的直接比较。在本文中,我们提出了基于机器学习算法的两种新检测方法。第一种方法包括在原始EM迹线上应用监督机器学习(ML)算法,以进行HT的分类和检测。它提供接近90%和假阴性小于5%的检出率。对于第二种方法,我们提出了一种基于异常值/新奇算法的方法。该方法与基于T检验的信号处理技术相结合,与现有技术相比,具有接近100%的检测速率的更好的性能,误报小于1%。我们已经在复杂的目标设计上评估了我们方法的性能:RISC-V通用处理器。具有0.53%,0.27%和0.1%的RISC-V处理器的三个HTS用于实验。实验结果表明,使用我们的新方法可以检测插入的HTS虽然很少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号