Hardware Trojan Detection and High-Precision Localization in NoC-based MPSoC using Machine Learning

被引:9
作者
Wang, Haoyu [1 ]
Halak, Basel [1 ]
机构
[1] Univ Southampton, Southampton, England
来源
2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC | 2023年
基金
英国工程与自然科学研究理事会;
关键词
NoC; MPSoC; Hardware Security; Hardware Trojan; ANN;
D O I
10.1145/3566097.3567922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networks-on-Chips (NoC) based Multi-Processor System-on-Chip (MPSoC) are increasingly employed in industrial and consumer electronics. Outsourcing third-party IPs (3PIPs) and tools in NoC-based MPSoC is a prevalent development way in most fabless companies. However, Hardware Trojan (HT) injected during its design stage can maliciously tamper with the functionality of this communication scheme, which undermines the security of the system and may cause a failure. Detecting and localizing HT with high precision is a challenge for current techniques. This work proposes for the first time a novel approach that allows detection and highprecision localization of HT, which is based on the use of packet information and machine learning algorithms. It is equipped with a novel Dynamic Confidence Interval (DCI) algorithm to detect malicious packets, and a novel Dynamic Security Credit Table (DSCT) algorithm to localize HT. We evaluated the proposed framework on the mesh NoC running real workloads. The average detection precision of 96.3% and the average localization precision of 100% were obtained from the experiment results, and the minimum HT localization time is around 5.8 similar to 12.9us at 2GHz depending on the different HT-infected nodes and workloads.
引用
收藏
页码:516 / 521
页数:6
相关论文
共 19 条
[1]   Fort-NoCs: Mitigating the Threat of a Compromised NoC [J].
Ancajas, Dean Michael ;
Chakraborty, Koushik ;
Roy, Sanghamitra .
2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
[2]  
Boraten T, 2016, DES AUT TEST EUROPE, P1136
[3]   Real-Time Detection and Localization of Distributed DoS Attacks in NoC-Based SoCs [J].
Charles, Subodha ;
Lyu, Yangdi ;
Mishra, Prabhat .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (12) :4510-4523
[4]   A Survey of Network-on-Chip Security Attacks and Countermeasures [J].
Charles, Subodha ;
Mishra, Prabhat .
ACM COMPUTING SURVEYS, 2021, 54 (05)
[5]   Lightweight and Trust-aware Routing in NoC-based SoCs [J].
Charles, Subodha ;
Mishra, Prabhat .
2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, :160-167
[6]   DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures [J].
Chaves, Cesar Giovanni ;
Azad, Siavoosh Payandeh ;
Hollstein, Thomas ;
Sepulveda, Johanna .
JOURNAL OF LOW POWER ELECTRONICS AND APPLICATIONS, 2019, 9 (01)
[7]  
Hestness Joel, 2010, P 3 INT WORKSH NOCAR, P31
[8]   EETD: An Energy Efficient Design for Runtime Hardware Trojan Detection in Untrusted Network-on-Chip [J].
Hussain, Mubashir ;
Malekpour, Amin ;
Guo, Hui ;
Parameswaran, Sri .
2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, :345-350
[9]  
Jiaqi Yao, 2020, 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), P173, DOI 10.1109/ITAIC49862.2020.9338861
[10]   Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques [J].
Kulkarni, Amey ;
Pino, Youngok ;
French, Matthew ;
Mohsenin, Tinoosh .
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)