Logo PTI Logo rice

Proceedings of the 2021 Sixth International Conference on Research in Intelligent and Computing

Annals of Computer Science and Information Systems, Volume 27

Hardware Trojan Detection Based on Side-Channel Analysis Using Power Traces and Machine Learning

DOI: http://dx.doi.org/10.15439/2021R26

Citation: Proceedings of the 2021 Sixth International Conference on Research in Intelligent and Computing, Vijender Kumar Solanki, Nguyen Ho Quang (eds). ACSIS, Vol. 27, pages 5356 ()

Full text

Abstract. With the continuous development of the Integrated Circuit (IC) manufacturing where international outsourcing is one of the main trends, hardware Trojan (HT) has been considered as a serious problem for hardware security in modern electronic systems. This paper presents a novel HT detection method based on the side-channel analysis with power traces and the machine learning (ML) technique. Side-channel information of the AES encryption core was acquired by the power consumption measurement equipment and then classified with Softmax regression. The ML technique was applied to classify and detect the HT. The experimental results have clarified the efficiency of the proposed method

References

  1. W. Ou, J. Zeng, Z. Guo, W. Yan, D. Liu, S. Fuentes, “A Homomorphic-encryption-based Vertical Federated Learning Scheme for Rick Management,” Computer Science and Information Systems, vol. 17, no. 3,pp. 819–834, 2020.
  2. Faisal Alotaibi, Alexei Lisitsa, “Matrix profile for DDoS attacks detection,” Proceedings of the 16th Conference on Computer Science and Intelligence Systems, Annals of Computer Science and Information Systems, vol. 25, pp. 357–361, 2021.
  3. Zhifeng Hu, Feng Zhao, Lina Qin, Hongkai Lin, “Network Virus and Computer Network Security Detection Technology Optimization,” Scalable Computing: Practice and Experience, vol. 22. no. 2, 2021.
  4. S. Bhunia and M. M. Tehranipoor, The Hardware Trojan War: Attacks, Myths, and Defenses, Springer, pp. 15-51, 2018.
  5. A. Amelian and S.E. Borujeni, “A Side-Channel Analysis for Hardware Trojan detection based on Path Delay Measurement,” Journal of Circuits, Systems, and Computers Vol. 27, No. 9, (2018).
  6. Elnaggar, R. & Chakrabarty, “Machine Learning for Hardware Security-Opportunities and Risks,” K. J Electron Test (2018) 34: 183.
  7. N.-T. Do, V.-P. Hoang and V.-S. Doan, “Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks,” 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Ha Long, Vietnam, 2020, pp. 66-69.
  8. M. Dao, V. Hoang, V. Dao and X. Tran, “An Energy Efficient AES Encryption Core for Hardware Security Implementation in IoT Systems,” Proc. 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, 2018, pp. 301-304.
  9. Trojan Benchmarks, Available: https://www.trust-hub.org/resource/benchmarks.