Identification and Localization of Quantum Electromagnetic Fields of Hardware Trojan Attacks using QDM-based Unsupervised Deep Learning

被引:0
作者
Ghimire, Ashutosh [1 ]
Hossain, Al Amin [1 ]
Bhatta, Niraj Prasad [1 ]
Amsaad, Fathi [1 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
来源
2023 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS, PAINE | 2023年
关键词
IC Security; Point of Interest; Trojan; Localization; electromagnetic side-channel; unsupervised;
D O I
10.1109/PAINE58317.2023.10317976
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring the reliability and trustworthiness of electronic systems heavily relies on maintaining the integrity and security of the semiconductor integrated circuit (IC) supply chain. Traditional hardware trojan detection methods often depend on side-channel analysis, which presents a drawback due to the limited availability of golden references. Although golden-free approaches can detect trojans, they lack automatic localization capabilities, necessitating complex reverse engineering of the entire IC. This paper presents a potential approach to efficiently identify points of interest (POIs) for trojan detection in ICs using Quantum Diamond Microscope (QDM) image analysis and unsupervised deep learning, without relying on golden references. The proposed method minimizes the need for extensive reverse engineering and offers a promising direction for future research in hardware trojan detection. By leveraging QDM magnetic field images, this approach has the potential to enhance the trustworthiness of the semiconductor IC supply chain through targeted trojan identification.
引用
收藏
页码:53 / 59
页数:7
相关论文
共 15 条
  • [1] Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images
    Ashok, Maitreyi
    Turner, Matthew J.
    Walsworth, Ronald L.
    Levine, Edlyn, V
    Chandrakasan, Anantha P.
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (04)
  • [2] Ghimire A., 2020, International Research Journal of Innovations in Engineering and Technology, V4, P5, DOI 10.47001/IRJIET/2020.405002
  • [3] Implementation of Secure and Privacy-aware AI Hardware using Distributed Federated Learning
    Ghimire, Ashutosh
    Asiri, Ahmad Nasser
    Hildebrand, Brian
    Amsaad, Fathi
    [J]. 2023 IEEE 16TH DALLAS CIRCUITS AND SYSTEMS CONFERENCE, DCAS, 2023,
  • [4] CSatDTA: Prediction of Drug-Target Binding Affinity Using Convolution Model with Self-Attention
    Ghimire, Ashutosh
    Tayara, Hilal
    Xuan, Zhenyu
    Chong, Kil To
    [J]. INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES, 2022, 23 (15)
  • [5] He CH, 2014, I C RELIABIL MAINTAI, P1043, DOI 10.1109/ICRMS.2014.7107362
  • [6] Application of Machine Learning in Hardware Trojan Detection
    Kundu, Shamik
    Meng, Xingyu
    Basu, Kanad
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 414 - 419
  • [7] Machine Learning for Hardware Trojan Detection: A Review
    Liakos, Konstantinos G.
    Georgakilas, Georgios K.
    Moustakidis, Serafeim
    Karlsson, Patrik
    Plessas, Fotis C.
    [J]. 2019 PANHELLENIC CONFERENCE ON ELECTRONICS AND TELECOMMUNICATIONS (PACET2019), 2019, : 139 - 144
  • [8] Multiphysics Simulation of EM Side-Channels from Silicon Backside with ML-based Auto-POI Identification
    Lin, Lang
    Zhu, Deqi
    Wen, Jimin
    Chen, Hua
    Lu, Yu
    Chang, Norman
    Chow, Calvin
    Shrivastav, Harsh
    Chen, Chia-Wei
    Montat, Kazuki
    Nagatat, Makoto
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 270 - 280
  • [9] HTDet: A Clustering Method Using Information Entropy for Hardware Trojan Detection
    Lu, Renjie
    Shen, Haihua
    Feng, Zhihua
    Li, Huawei
    Zhao, Wei
    Li, Xiaowei
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (01) : 48 - 61
  • [10] Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
    Narasimhan, Seetharam
    Du, Dongdong
    Chakraborty, Rajat Subhra
    Paul, Somnath
    Wolff, Francis G.
    Papachristou, Christos A.
    Roy, Kaushik
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2183 - 2195