Hardware Trojan Detection employing Machine Learning, Physical Unclonable Functions and Side Channel Analysis

被引:1
作者
Saraf, Muskan [1 ]
Syed, Talha Hussain [1 ]
Kulkarni, Akshay [1 ]
Niamat, Mohammed [1 ]
机构
[1] Univ Toledo, Dept EECS, 2801 W Bancroft St, Toledo, OH 43606 USA
来源
2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024 | 2024年
关键词
Hardware Trojans; machine learning; power consumption; ring oscillator physical unclonable functions; side channel attacks;
D O I
10.1109/eIT60633.2024.10609912
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization in the semiconductor domain, primarily to reduce the cost of fabrication, has engendered the integrated circuits (ICs) to be compromised. These semiconductor chips are vulnerable to various attacks such as - hardware Trojan (HT) intrusion. These stealthy HTs can compromise the integrity and functionality of the devices by leaking critical information, compromising the performance, or causing a complete device shutdown. Detecting HTs before deploying ICs in critical infrastructure, is essential to safeguard against these threats. Significant research is done in this area; however, a fool proof technique of HT detection is still required. With this background, this paper presents a technique for the efficient detection of hardware Trojans within ICs, leveraging both power side channel analysis and machine learning (ML) algorithms. The framework proposed in this paper measures the variations in the power consumption of a ring oscillator physical unclonable function (ROPUF) and trains the collected dataset to execute the ML algorithms. The ROPUF is programmed on an Artix-7 FPGA mounted on a Nexys 4 Digilent board, implemented with a Trojan. Our approach uses k-nearest neighbors (knn), logistic regression (LR), and decision tree (DT) as the three ML algorithms to detect hardware Trojan, assessed on four parameters - accuracy, precision, recall, and F1 score. We also present confusion matrix of each executed algorithm. The results demonstrate that LR gives the best precision of 100%, while best accuracy and recall is presented by DT at 98%.
引用
收藏
页码:514 / 519
页数:6
相关论文
共 21 条
  • [1] Amsaad F, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P185, DOI 10.1109/HST.2016.7495580
  • [2] Amsaad Fathi, 2015, MIDWEST S CIRCUITS S
  • [3] Bhunia S., 2019, HARDWARE SECURITY PR, P311
  • [4] Chauhan AS, 2019, J ELECTRON TEST, V35, P581, DOI 10.1007/s10836-019-05829-5
  • [5] Brand and IP protection with physical unclonable functions
    Guajardo, Jorge
    Kumar, Sandeep S.
    Schrijen, Geert-Jan
    Tuyls, Pim
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 3186 - +
  • [6] Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures
    Hazari, Noor Ahmad
    Oun, Ahmed
    Niamat, Mohammed
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)
  • [7] Hosmer J.D.W., 2013, Applied Logistic Regression, V398
  • [8] An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
    Hu, Wei
    Chang, Chip-Hong
    Sengupta, Anirban
    Bhunia, Swarup
    Kastner, Ryan
    Li, Hai
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1010 - 1038
  • [9] James G, 2013, SPRINGER TEXTS STAT, V103, P1, DOI 10.1007/978-1-4614-7138-7_1
  • [10] Kulkarni Akshay, 2023, 2023 IEEE International Conference on Electro Information Technology (eIT), P436, DOI 10.1109/eIT57321.2023.10187268