Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques

被引:19
|
作者
Elnaggar, Rana [1 ]
Chakrabarty, Krishnendu [1 ]
Tahoori, Mehdi B. [2 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[2] Karlsruhe Inst Technol, Dept Comp Sci, Chair Dependable Nano Comp, D-76131 Karlsruhe, Germany
关键词
Clustering; hardware performance counters; hardware security; hardware trojans; machine learning; NETWORK;
D O I
10.1109/TVLSI.2019.2925807
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a growing trend in recent years to outsource various aspects of the semiconductor design and manufacturing flow to different parties spread across the globe. Such outsourcing increases the risk of adversaries adding malicious logic, referred to as hardware Trojans, to the original design. The increased complexity of modern microprocessors increases the difficulty in detecting hardware Trojans at early stages of design and manufacturing. Therefore, there is a need for run-time detection techniques to capture Trojans that escape detection at these stages. In this paper, we introduce a machine learning-based run-time hardware Trojan detection method for microprocessor cores. This approach uses changepoint-based anomaly detection algorithm to detect the activation of Trojans that introduce abnormal patterns in the data streams obtained from performance counters. It does not modify the original microprocessor design to integrate on-chip monitoring sensors. We evaluate our method by detecting the activation of Trojans that cause denial-of-service, the degradation of system performance, and change in functionality of a microprocessor core. Results obtained using the OpenSPARC T1 core and an field-programmable gate array (FPGA) prototyping framework show that the Trojan activation is detected with a true positive rate of above 99% and a false positive rate of 0% for most of the implemented Trojans.
引用
收藏
页码:2706 / 2719
页数:14
相关论文
共 50 条
  • [1] Changepoint-based Anomaly Detection in a Core Router System
    Jin, Shi
    Zhang, Zhaobo
    Chakrabarty, Krishnendu
    Gu, Xinli
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [2] Changepoint-Based Anomaly Detection for Prognostic Diagnosis in a Core Router System
    Jin, Shi
    Zhang, Zhaobo
    Chakrabarty, Krishnendu
    Gu, Xinli
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (07) : 1331 - 1344
  • [3] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [4] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [5] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [6] Review on Hardware Trojan Detection Techniques
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Sathayapriya, S. Sridevi
    [J]. NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (06): : 521 - 524
  • [7] Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques
    Yen, Chia-Heng
    Tsai, Jung-Che
    Wu, Kai-Chiang
    [J]. 2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 638 - 645
  • [8] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    [J]. Adv. Intell. Sys. Comput., (978-987):
  • [9] A Method of Hardware-Trojan Detection Using Design Verification Techniques
    Hiramoto, Yushiro
    Ohtake, Satoshi
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
  • [10] Hardware Trojan Detection Techniques Using Side-Channel Analysis
    Thi-Tam Hoang
    Thai-Ha Tran
    Van-Phuc Hoang
    Xuan-Nam Tran
    Cong-Kha Pham
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 528 - 533