Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism

被引:3
作者
Chen, Shouhong [2 ]
Wang, Tao [2 ]
Huang, Zhentao [2 ]
Hou, Xingna [1 ,2 ]
机构
[1] Guilin Univ Elect Technol, Sch Architecture & Transportat Engn, Guilin 541000, Peoples R China
[2] Guilin Univ Elect Technol, Sch Elect Engn & Automat, Guilin 541000, Peoples R China
基金
中国国家自然科学基金;
关键词
Hardware Trojan detection; ResNeXt; Attention mechanism; Golden Chip-Free; Side-channel analysis; NETWORK;
D O I
10.1016/j.cose.2023.103428
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely studied. Machine learning methods are widely used in the detection of hardware Trojans, but with the development of integrated circuits (IC), machine learning methods are not able to obtain a higher accuracy rate compared to deep learning. In this paper, we propose to use an architecture inspired by the ResNeXt network architecture and combine it with an attention mechanism, referred to as the Attention-Res-Attention (ARA) network. Firstly, the side channel data are extracted by convolutional layer with features and focus on important points under the attention module; then, the feature map enters the ResNeXt architecture that achieves classification accuracy improvement by adding the attention module; finally, the data are classified by the fully connected layer. Our proposed solution is observable to natural variations that may occur in side-channel measurements, and can accurately detect abnormal behavior of the chip when HT is triggered. And using a self-referential method for HT detection eliminates the need for a golden chip. The effectiveness of the method proposed in this paper is evaluated based on the AES series hardware Trojans publicly provided by TrustHub. Experimental results show that the method proposed in this paper has a high accuracy rate when a single Trojan exists, and can effectively detect the existence of hardware Trojans. And when a variety of hardware Trojans exist at the same time, the method used in this paper can effectively distinguish the types of hardware Trojans, and the highest average accuracy rate reached 97% during the experiment. Compared with the existing deep learning methods, the network model in this paper has higher classification accuracy.
引用
收藏
页数:8
相关论文
共 43 条
  • [1] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [2] Bao C, 2015, INT SYM QUAL ELECT, P47
  • [3] Chakraborty R.S., 2009, PROEED 2009 IEEE ACM, P113
  • [4] Dubeuf J, 2013, PROC EUR TEST SYMP
  • [5] Faezi S, 2021, PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), P1484, DOI 10.23919/DATE51398.2021.9474076
  • [6] Brain-Inspired Golden Chip Free Hardware Trojan Detection
    Faezi, Sina
    Yasaei, Rozhin
    Barua, Anomadarshi
    Al Faruque, Mohammad Abdullah
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) : 2697 - 2708
  • [7] Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
  • [8] Howard AG, 2017, Arxiv, DOI arXiv:1704.04861
  • [9] How Secure Are Printed Circuit Boards Against Trojan Attacks?
    Ghosh, Swaroop
    Basak, Abhishek
    Bhunia, Swarup
    [J]. IEEE DESIGN & TEST, 2015, 32 (02) : 7 - 16
  • [10] Hardware Trojan Detection Utilizing Machine Learning Approaches
    Hasegawa, Kento
    Shi, Youhua
    Togawa, Nozomu
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1891 - 1896