A new hardware Trojan detection technique using deep convolutional neural network

被引:9
作者
Sharma, Richa [1 ]
Rathor, Vijaypal Singh [2 ]
Sharma, G. K. [1 ]
Pattanaik, Manisha [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474015, Madhya Pradesh, India
[2] Thapar Inst Engn & Technol, Dept Elect & Commun Engn, Patiala 147004, Punjab, India
关键词
Hardware Trojan; Reverse engineering; Machine learning; Deep convolutional neural network; SECURITY; INTERNET; THREAT; THINGS;
D O I
10.1016/j.vlsi.2021.03.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The involvement of external vendors in semiconductor industries increases the chance of hardware Trojan (HT) insertion in different phases of the integrated circuit (IC) design. Recently, several partial reverse engineering (RE) based HT detection techniques are reported, which attempt to reduce the time and complexity involved in the full RE process by applying machine learning or image processing techniques in IC images. However, these techniques fail to extract the relevant image features, not robust to image variations, complicated, less generalizable, and possess a low detection rate. Therefore, to overcome the above limitations, this paper proposes a new partial RE based HT detection technique that detects Trojans from IC layout images using Deep Convolutional Neural Network (DCNN). The proposed DCNN model consists of stacking several convolutional and pooling layers. It layer-wise extracts and selects the most relevant and robust features automatically from the IC images and eliminates the need to apply the feature extraction algorithm separately. To prevent the over-training of the DCNN model, a new stopping condition method and two new metrics, namely Accuracy difference measure (ADM) and Loss difference measure (LDM), are proposed that halts the training only when the performance of our model genuinely drops. Further, to combat the issue of process variations and fabrication noise generated during the RE process, we include noisy images with varying parameters in the training process of the model. We also apply the data augmentation and regularization techniques in the model to address the issues of underfitting and overfitting. Experimental evaluation shows that the proposed technique provides 99% and 97.4% accuracy on Trust-Hub and synthetic ISCAS dataset, respectively, which is on-an-average 15.83% and 21.69% higher than the existing partial RE based techniques.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 59 条
  • [1] Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQs
    Aarestad, Jim
    Acharyya, Dhruva
    Rad, Reza
    Plusquellic, Jim
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 893 - 904
  • [2] The hunt for the kill switch
    Adee, Sally
    [J]. IEEE SPECTRUM, 2008, 45 (05) : 34 - 39
  • [3] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [4] [Anonymous], 2017, 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)
  • [5] [Anonymous], 2010, ICML
  • [6] Privacy and Security in Internet of Things and Wearable Devices
    Arias, Orlando
    Wurm, Jacob
    Khoa Hoang
    Jin, Yier
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02): : 99 - 109
  • [7] A Novel Sustained Vector Technique for the Detection of Hardware Trojans
    Banga, Mainak
    Hsiao, Michael S.
    [J]. 22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 327 - 332
  • [8] Bao C, 2015, INT SYM QUAL ELECT, P47
  • [9] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [10] Benesty J, 2009, SPRINGER TOP SIGN PR, V2, P37, DOI 10.1007/978-3-642-00296-0_5