首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
【24h】

Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

机译:微控制器指令的电源分析为运行时硬件 yryjans检测没有金电路型号

获取原文

摘要

Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of ICs against hardware Trojans (HT). Recently, several side channel parameters based techniques have been developed to detect these hardware Trojans that require golden circuit as a reference model, but due to the widespread usage of IPs, most of the system-on-chip (SoC) do not have a golden reference. Hardware Trojans in intellectual property (IP)-based SoC designs are considered as major concern for future integrated circuits. Most of the state-of-the-art runtime hardware Trojan detection techniques presume that Trojans will lead to anomaly in the SoC integration units. In this paper, we argue that an intelligent intruder may intrude the IP-based SoC without disturbing the normal SoC operation or violating any protocols. To overcome this limitation, we propose a methodology to extract the power profile of the micro-controllers instruction sets, which is in turn used to train a machine learning algorithm. In this technique, the power profile is obtained by extracting the power behavior of the micro-controllers for different assembly language instructions. This trained model is then embedded into the integrated circuits at the SoC integration level, which classifies the power profile during runtime to detect the intrusions. We applied our proposed technique on MC8051 micro-controller in VHDL, obtained the power profile of its instruction set and then applied deep learning, k-NN, decision tree and naive Bayesian based machine learning tools to train the models. The cross validation comparison of these learning algorithm, when applied to MC8051 Trojan benchmarks, shows that we can achieve 87% to 99% accuracy. To the best of our knowledge, this is the first work in which the power profile of a microprocessor's instruction set is used in conjunction with machine learning for runtime HT detection.
机译:集成电路(IC)设计的全球化趋势导致ICS对硬件特洛伊木马(HT)的脆弱性。最近,已经开发了几种基于侧信道参数的技术来检测这些硬件特洛伊木马,需要金电路作为参考模型,但由于IP的广泛使用,大多数片上系统(SoC)都没有金色参考。知识产权(IP)的硬件特洛伊木马被认为是未来集成电路的主要关注点。大多数最先进的运行时硬件特洛伊木马检测技术认为特洛伊木马将导致SoC集成单元中的异常。在本文中,我们认为智能入侵者可能会侵入基于IP的SOC,而不会干扰正常的SOC操作或违反任何协议。为了克服这种限制,我们提出了一种方法来提取微控制器指令集的功率分布,又用于训练机器学习算法。在该技术中,通过提取用于不同的汇编语言指令的微控制器的电力行为来获得功率分布。然后将该培训的模型嵌入到SOC集成级别的集成电路中,该模型在运行时在运行时分类功率分布以检测入侵。我们在VHDL的MC8051微控制器上应用了我们的提出技术,获得了其指令集的电源配置文件,然后应用了深度学习,K-NN,决策树和天真贝叶斯的机器学习工具培训模型。这些学习算法的交叉验证比较,当应用于MC8051 Trojan基准时,表明我们可以获得87%至99%的准确性。据我们所知,这是第一项工作,其中微处理器指令集的电源配置与运行时HT检测的机器学习结合使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号