AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection

被引:8
作者
Vakil, Ashkan [1 ]
Mirzaeian, Ali [1 ]
Homayoun, Houman [2 ]
Karimi, Naghmeh [3 ]
Sasan, Avesta [1 ]
机构
[1] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[2] Univ Calif Davis, Dept Elect & Comp Engn, Davis, CA 95616 USA
[3] Univ Maryland Baltimore Cty, Dept Comp Sci, Baltimore, MD 21250 USA
关键词
Trojan horses; Delays; Monitoring; Integrated circuit modeling; Payloads; Avatars; Hardware; Hardware trojan; clock frequency sweeping test; neural network; side channel analysis; process variation; process drift; SELECTION; THREAT;
D O I
10.1109/ACCESS.2021.3093160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC. AVATAR is a side-channel delay-based testing solution that is assisted by a learning model (process watchdog) for tracking the process drift and systematic process variation. AVATAR's process watchdog model is trained using a limited number of test samples, collected at test time, to tightly correlate the Static Timing Analysis results (generated at design time) to the test results (generated from clock frequency sweeping test). The experimental results confirm that AVATAR detects over 98% of (small) Trojans inserted in the selected benchmarks. We have complemented our proposed solution with a diagnostic test that 1) further reduces the false-positive rate of AVATAR Trojan detection to zero or near zero, and 2) pinpoints the net-location of the Trojan Trigger or Payload.
引用
收藏
页码:92881 / 92900
页数:20
相关论文
共 47 条
  • [1] The hunt for the kill switch
    Adee, Sally
    [J]. IEEE SPECTRUM, 2008, 45 (05) : 34 - 39
  • [2] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [3] Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
  • [4] [Anonymous], 2016, IEEE ASIAN HARDWAREO, DOI DOI 10.1109/ASIANHOST.2016.7835571
  • [5] [Anonymous], 2017, J. Hardw. Syst. Security, P85, DOI [10.1007/s41635-017-0001-6, DOI 10.1007/S41635-017-0001-6]
  • [6] Apache A., REDHAWK
  • [7] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
  • [8] Breiman L, 1996, MACH LEARN, V24, P49
  • [9] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [10] D. S. Board, 2005, TASK FORCE HIGH PERF