MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices

被引:11
|
作者
Khalid, Faiq [1 ]
Hasan, Syed Rafay [2 ]
Zia, Sara [3 ]
Hasan, Osman [3 ]
Awwad, Falah [4 ]
Shafique, Muhammad [5 ,6 ]
机构
[1] Tech Univ Wien, Inst Comp Engn, A-1040 Vienna, Austria
[2] Tennessee Technol Univ, Elect & Comp Engn Dept, Cookeville, TN 38505 USA
[3] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[4] UAE Univ, Coll Engn, Dept Elect Engn, Al Ain, U Arab Emirates
[5] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
[6] Tech Univ Wien, A-1040 Vienna, Austria
关键词
Hardware security; hardware trojans; LEON3; machine learning; microprocessor; power profiling;
D O I
10.1109/TCAD.2020.3012236
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional learning-based approaches for runtime hardware Trojan (HT) detection require complex and expensive on-chip data acquisition frameworks, and thus incur high area and power overhead. To address these challenges, we propose to leverage the power correlation between the executing instructions of a microprocessor to establish a machine learning (ML)-based runtime HT detection framework, called MacLeR. To reduce the overhead of data acquisition, we propose a single power-port current acquisition block using current sensors in time-division multiplexing, which increases accuracy while incurring reduced area overhead. We have implemented a practical solution by analyzing multiple HT benchmarks inserted in the RTL of a system-on-chip (SoC) consisting of four LEON3 processors integrated with other IPs, such as vga_lcd, RSA, AES, Ethernet, and memory controllers. Our experimental results show that compared to state-of-the-art HT detection techniques, MacLeR achieves 10% better HT detection accuracy (i.e., 96.256%) while incurring a 7x reduction in area and power overhead (i.e., 0.025% of the area of the SoC and < 0.07% of the power of the SoC). In addition, we also analyze the impact of process variation (PV) and aging on the extracted power profiles and the HT detection accuracy of MacLeR. Our analysis shows that variations in fine-grained power profiles due to the HTs are significantly higher compared to the variations in fine-grained power profiles caused by the PVs and aging effects. Moreover, our analysis demonstrates that on average, the HT detection accuracy drops in MacLeR is less than 1% and 9% when considering only PV and PV with worst case aging, respectively, which is similar to 10x less than in the case of the state-of-the-art ML-based HT detection technique.
引用
收藏
页码:3748 / 3761
页数:14
相关论文
共 50 条
  • [21] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [22] Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
    Jouhari, Mohammed
    Guizani, Mohsen
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1558 - 1563
  • [23] Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices
    Nastic, Stefan
    Hong-Linh Truong
    Dustdar, Schahram
    2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2017, : 3535 - 3540
  • [24] ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems
    Yildiran Yilmaz
    Leonardo Aniello
    Basel Halak
    Journal of Hardware and Systems Security, 2021, 5 (1) : 1 - 18
  • [25] FogFL: Fog-Assisted Federated Learning for Resource-Constrained IoT Devices
    Saha, Rituparna
    Misra, Sudip
    Deb, Pallav Kumar
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10) : 8456 - 8463
  • [26] Machine Learning-based Intrusion Detection for IoT Devices in Smart Home
    Li, Taotao
    Hong, Zhen
    Yu, Li
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 277 - 282
  • [27] Deploying Machine Learning in Resource-Constrained Devices for Human Activity Recognition
    Reusch, Rafael Schild
    Juracy, Leonardo Rezende
    Moraes, Fernando Gehm
    2023 XIII BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING, SBESC, 2023,
  • [28] Balanced Energy Consumption Based on Historical Participation of Resource-Constrained Devices in Federated Edge Learning
    Albaseer, Abdullatif
    Abdallah, Mohamed
    Al-Fuqaha, Ala
    Erbad, Aiman
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 300 - 305
  • [29] Learning-Based Localized Offloading with Resource-Constrained Data Centers
    Guo, Jia
    Wendt, James B.
    Potkonjak, Miodrag
    2015 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC), 2015, : 212 - 215
  • [30] Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists
    Hasegawa, Kento
    Hidano, Seira
    Nozawa, Kohei
    Kiyomoto, Shinsaku
    Togawa, Nozomu
    2021 IEEE 27TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2021,