Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models

被引:0
|
作者
Amornpaisannon, Burin [1 ]
Diavastos, Andreas [2 ]
Peh, Li-Shiuan [2 ]
Carlson, Trevor E. [2 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[2] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
关键词
Analytical modeling; embedded security; hardware Trojan detection; THREAT;
D O I
10.1109/TCAD.2023.3316113
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans, malicious components that attempt to prevent a chip from operating as expected, are carefully crafted to circumvent detection during the predeployment silicon design and verification stages. They are an emerging threat being investigated by academia, the military, and industry. Therefore, run-time hardware Trojan detection is critically needed as the final layer of defense during chip deployment, and in this work, we focus on hardware Trojans that target the processor's performance. Current state-of-the-art detectors watch hardware counters for anomalies using complex machine-learning models, which require a dedicated off-chip processor and must be trained extensively for each target processor. In this work, we propose a lightweight solution that uses data from a single reference run to accurately determine whether a Trojan is slowing processor performance, across CPU configurations, without the need for new profiles. To accomplish this, we use an analytical model based on the application's inherent microarchitecturally independent characteristics. Such models determine the expected microarchitectural events across different processor configurations without requiring reference values for each application-hardware configuration pair. By comparing predicted values to actual hardware events, one can quickly check for unexpected application slowdowns that are the key signatures of many hardware Trojans. The proposed methodology achieves a higher true positive rate (TPR) compared to prior works while having no false positives. The proposed detector incurs no run-time performance penalty and only adds a negligible power overhead of 0.005%.
引用
收藏
页码:431 / 441
页数:11
相关论文
共 50 条
  • [1] Run-Time Hardware Trojan Detection Using Performance Counters
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [2] Hardware Property Checker for Run-Time Hardware Trojan Detection
    Ngo, Xuan Thuy
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    Emery, Olivier
    [J]. 2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 97 - 100
  • [3] Hardware Trojan Detection at Run-time Using Machine-Learning Techniques
    Chakrabarty, Krishnendu
    [J]. 2020 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2020,
  • [4] Temperature Tracking: An Innovative Run-Time Approach for Hardware Trojan Detection
    Forte, Domenic
    Bao, Chongxi
    Srivastava, Ankur
    [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 532 - 539
  • [5] LAOCOON: A Run-time Monitoring and Verification Approach for Hardware Trojan Detection
    Danger, Jean-Luc
    Fribourg, Laurent
    Naceur, Maha
    Kuhne, Ulrich
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 269 - 276
  • [6] PCB Hardware Trojan Run-Time Detection Through Machine Learning
    Piliposyan, Gor
    Khursheed, Saqib
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1958 - 1970
  • [7] High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery
    Cui, Xiaotong
    Ma, Kun
    Shi, Liang
    Wu, Kaijie
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [8] Run-Time Hardware Trojan Detection in Analog and Mixed-Signal ICs
    Pavlidis, Antonios
    Faehn, Eric
    Louerat, Marie-Minerve
    Stratigopoulos, Haralampos-G
    [J]. 2022 IEEE 40TH VLSI TEST SYMPOSIUM (VTS), 2022,
  • [9] Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection
    Li, Ying
    Chen, Lan
    Wang, Jian
    Gong, Guanfei
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 173 - 176
  • [10] Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors
    Hasan, Syed Rafay
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Njilla, Laurent
    [J]. PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,