Hardware Trojan detection algorithm based on deep learning

被引:0
|
作者
Liu, Zhiqiang [1 ,2 ]
Zhang, Mingjin [1 ,2 ]
Chi, Yuan [3 ]
Li, Yunsong [1 ]
机构
[1] State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an,710071, China
[2] CAS Key Laboratory of Spectral Imaging Technology, Xi'an,710119, China
[3] Science and Technology on Reliability Physics and Application of Electronic Component Laboratory, Fifth Electronics Research Institute of Ministry of Industry and Information Technology, Guangzhou,510610, China
关键词
Change detection - Signal detection - Image segmentation - Mathematical morphology - Malware - Deep learning;
D O I
10.19665/j.issn1001-2400.2019.06.006
中图分类号
学科分类号
摘要
The traditional way of hardware trojan detection based on electrical signal detection has problems of low positive rate, low efficiency and high cost. To solve these problems, we propose a new way of hardware trojan detection based on deep learning which is not electrical signal detection. First, the algorithm changes chip microscopic images of low resolution into chip microscopic images of high resolution by using an enhanced residual network. Then these chip microscopic images of high resolution will generate another chip microscopic images which are similar to those of the golden model. The algorithm for image enhancement distinguishes between target area and background area by combining with the algorithm of image segmentation. Finally, we use the change detection algorithm to detect the hardware trojans existing in the chip after removing minor interference due to industrial noise. Through the experiments on the micrograph dataset of the chip, the positive detection rate of the hardware trojan detection method based on deep learning is as high as 92.4%. Compared with the traditional electrical signal detection method, our algorithm has the advantages of higher precision, faster speed, and easier operation. © 2019, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:37 / 45
相关论文
共 50 条
  • [31] Network-on-Chip hardware Trojan detection platform based on machine learning
    Yao, Jiaqi
    Zhang, Ying
    Xin, Chen
    [J]. Journal of Physics: Conference Series, 2022, 2189 (01):
  • [32] Electromagnetic Side-Channel Hardware Trojan Detection Based on Transfer Learning
    Sun, Shaofei
    Zhang, Hongxin
    Cui, Xiaotong
    Dong, Liang
    Fang, Xing
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1742 - 1746
  • [33] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [34] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [35] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [36] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    [J]. 2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [37] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    [J]. Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [38] Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
    Hu, Taifeng
    Wu, Liji
    Zhang, Xiangmin
    Liao, Zhaopo
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 96 - 103
  • [39] A Research on Detection Algorithm of Failure-Type Hardware Trojan
    Xiao, Da
    Zhu, Yue-fei
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 918 - 921
  • [40] A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering
    Rajendran, Sreeja
    Regeena, Mary Lourde
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 1154 - 1166