Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism

被引:3
作者
Chen, Shouhong [2 ]
Wang, Tao [2 ]
Huang, Zhentao [2 ]
Hou, Xingna [1 ,2 ]
机构
[1] Guilin Univ Elect Technol, Sch Architecture & Transportat Engn, Guilin 541000, Peoples R China
[2] Guilin Univ Elect Technol, Sch Elect Engn & Automat, Guilin 541000, Peoples R China
基金
中国国家自然科学基金;
关键词
Hardware Trojan detection; ResNeXt; Attention mechanism; Golden Chip-Free; Side-channel analysis; NETWORK;
D O I
10.1016/j.cose.2023.103428
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since 2007, the use of side-channel data to detect hardware Trojans (HT) has been widely studied. Machine learning methods are widely used in the detection of hardware Trojans, but with the development of integrated circuits (IC), machine learning methods are not able to obtain a higher accuracy rate compared to deep learning. In this paper, we propose to use an architecture inspired by the ResNeXt network architecture and combine it with an attention mechanism, referred to as the Attention-Res-Attention (ARA) network. Firstly, the side channel data are extracted by convolutional layer with features and focus on important points under the attention module; then, the feature map enters the ResNeXt architecture that achieves classification accuracy improvement by adding the attention module; finally, the data are classified by the fully connected layer. Our proposed solution is observable to natural variations that may occur in side-channel measurements, and can accurately detect abnormal behavior of the chip when HT is triggered. And using a self-referential method for HT detection eliminates the need for a golden chip. The effectiveness of the method proposed in this paper is evaluated based on the AES series hardware Trojans publicly provided by TrustHub. Experimental results show that the method proposed in this paper has a high accuracy rate when a single Trojan exists, and can effectively detect the existence of hardware Trojans. And when a variety of hardware Trojans exist at the same time, the method used in this paper can effectively distinguish the types of hardware Trojans, and the highest average accuracy rate reached 97% during the experiment. Compared with the existing deep learning methods, the network model in this paper has higher classification accuracy.
引用
收藏
页数:8
相关论文
共 43 条
  • [11] Hasegawa K, 2017, IEEE INT ON LINE, P227, DOI 10.1109/IOLTS.2017.8046227
  • [12] A Hardware-Trojan Classification Method Using Machine Learning at Gate-Level Netlists Based on Trojan Features
    Hasegawa, Kento
    Yanagisawa, Masao
    Togawa, Nozomu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (07) : 1427 - 1438
  • [13] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [14] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [15] A Convolutional Attention Residual Network for Stereo Matching
    Huang, Guangyi
    Gong, Yongyi
    Xu, Qingzhen
    Wattanachote, Kanoksak
    Zeng, Kun
    Luo, Xiaonan
    [J]. IEEE ACCESS, 2020, 8 : 50828 - 50842
  • [16] Inoue T, 2018, IEEE I C CONS ELECT
  • [17] Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
  • [18] Jin Y, 2012, DES AUT TEST EUROPE, P965
  • [19] Jin Y, 2014, DES AUT TEST EUROPE
  • [20] Kkalais, 2020, Machine Learning Techniques for Hardware Trojan Detection