RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel

被引:2
|
作者
Kan, John [1 ]
Shen, Yuyi [1 ]
Xu, Jiachen [1 ]
Chen, Ethan [1 ]
Zhu, Jimmy [1 ]
Chen, Vanessa [1 ]
机构
[1] Carnegie Mellon Univ, Elect & Comp Engn Dept, Pittsburgh, PA 15213 USA
关键词
Trojan horses; Hardware; Transistors; Integrated circuits; Voltage; Optical switches; Integrated optics; Hardware security; RF; Analog; magnetic tunnel junction sensor; classification autoencoder; FPGA;
D O I
10.1109/OJCAS.2022.3210163
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advent of globalization, hardware trojans provide an ever-present threat to the security of devices. Much of the research to date has centered around documenting and providing detection methods for digital trojans. Few, however, have explored the space of trojans in the RF/analog front end. Two hardware trojans, an analytical analysis of the trojan impacts on two different types of amplifiers, and an unsupervised ML detection method for edge IOT applications using magnetic tunnel junction sensors for side-channel monitoring are explored. A classification autoencoder for anomaly detection is presented with an accuracy of greater than 90% with both single tone and BLE data is presented.
引用
收藏
页码:237 / 251
页数:15
相关论文
共 50 条
  • [31] Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
    Ghandali, Samaneh
    Moos, Thorben
    Moradi, Amir
    Paar, Christof
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (06) : 1435 - 1448
  • [32] Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection
    Jap, Dirmanto
    He, Wei
    Bhasin, Shivam
    2016 IEEE 27TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2016, : 17 - 24
  • [33] An intelligent classification method for Trojan detection based on side-channel analysis
    Wang, Chenxu
    Li, Jinghu
    Yu, Mingyan
    Wang, Jinxiang
    IEICE ELECTRONICS EXPRESS, 2013, 10 (17):
  • [34] An Implementation of Trojan Side-Channel with a Masking Scheme
    Meng, Wenlin
    Zhu, Wenfeng
    Zhang, Chi
    Liu, Junrong
    Guo, Zheng
    Gu, Dawu
    Fan, Wei
    Zhang, Haifeng
    Yuan, Yidong
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 566 - 569
  • [35] A Side-Channel Hardware Trojan Detection Method Based on Fuzzy C-Means Clustering and Fusion Distance Algorithms
    He, Chunhua
    Lei, Dengyun
    Wu, Heng
    Cheng, Lianglun
    Yan, Guizhen
    Huang, Qinwen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13927 - 13937
  • [36] Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
    Xuan Thuy Ngo
    Najm, Zakaria
    Bhasin, Shivam
    Guilley, Sylvain
    Danger, Jean-Luc
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 239 - 247
  • [37] MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection
    Huang, Yuanwen
    Bhunia, Swarup
    Mishra, Prabhat
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 130 - 141
  • [38] DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator
    Chandrasekar, Srivatsan
    Lam, Siew-Kei
    Thambipillai, Srikanthan
    APPLIED RECONFIGURABLE COMPUTING. ARCHITECTURES, TOOLS, AND APPLICATIONS, ARC 2023, 2023, 14251 : 146 - 158
  • [39] Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting
    He, Jiaji
    Ma, Haocheng
    Liu, Yanjiang
    Zhao, Yiqiang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (01)
  • [40] Hiding Side-channel Leakage through Hardware Randomization: a Comprehensive Overview
    Mentens, Nele
    INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION (SAMOS 2017), 2017, : 269 - 272