Smart Hardware Trojan Detection System

被引:1
|
作者
Alkhazendar, Iyad [1 ]
Zubair, Mohammed [1 ]
Qidwai, Uvais [1 ]
机构
[1] Qatar Univ, Dept Comp Sci Engn, Doha, Qatar
关键词
Smart cities; Internet of Things; Hardware Trojan; DOS attack; Smart detection system; INTERNET; THINGS; FUSION;
D O I
10.1007/978-3-031-16075-2_58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The IoT has become an indispensable part of human lives at work and home applications. Due to the need for an enormous number of IoT devices manufacturers are least concerned about security vulnerabilities during designing and developing of these devices. Because of this, it becomes easier for adversaries to manipulate the hardware and insert Trojans or Remote File Inclusion to control remotely. In this research, we aim to build a model to identify hardware Trojans in IoT devices using Deep learning. We used different machine learning models to evaluate the performance and accuracy. In addition we choose a distinctive feature that can detect the presence of Trojan in these devices. The proposed model is evaluated using an existing and real-time dataset generated using a smart city testbed, The testbed used was designed to simulate and evaluate the Hardware trojan attacks, and by using the real-time dataset we could measure the power profile and network traffic on the IoT gateway device to analyze the performance and the accuracy.
引用
收藏
页码:791 / 806
页数:16
相关论文
共 50 条
  • [1] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [2] A New Hardware Trojan Detection System Based on CRON
    Meng, Jia
    Ren, Qiang
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM 2019), 2019, : 246 - 251
  • [3] Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
    Lecomte, Maxime
    Fournier, Jacques J. A.
    Maurine, Philippe
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 135 - 138
  • [4] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    [J]. COMPUTER, 2019, 52 (06) : 4 - 5
  • [5] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [6] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [7] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [8] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [9] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [10] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524