Hardware Trojan Detection Using Machine Learning: A Tutorial

نویسندگان

چکیده

With the growth and globalization of IC design development, there is an increase in number Designers Design houses. As setting up a fabrication facility may easily cost upwards $20 billion, costs for advanced nodes be even greater. houses that cannot produce their chips in-house have no option but to use external foundries are often other countries. Establishing trust with these can challenge, assumed untrusted. The untrusted global semiconductor supply chain has raised concerns about security fabricated ICs targeted sensitive applications. One threats adversarial infestation Hardware Trojan (HT) . An HT broadly described as malicious modification circuit control, modify, disable, or monitor its logic. Conventional VLSI manufacturing tests verification methods fail detect due different un-modeled nature modifications. Current state-of-the-art detection utilize statistical analysis various side-channel information collected from ICs, such power analysis, transient regional current temperature wireless transmission delay analysis. To HTs, most require Trojan-free reference golden IC. A signature extracted used HTs. However, access not always feasible. Thus, mechanism sought does Machine Learning (ML) approaches emerged extremely useful helping eliminate need Recent works on utilizing ML been shown promising achieving this goal. tutorial, we will explain solution challenge detection. Additionally, describe Electronic Automation (EDA) tool flow automating ML-assisted Moreover, further discuss benefits solutions, demonstrate Neural Network (NN) -assisted timing profiling method Finally, shortcomings open challenges methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

Hardware Trojan Identification and Detection

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

متن کامل

System-level protection and hardware Trojan detection using weighted voting☆

The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by comparing the suspected chip with a golden c...

متن کامل

Hardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis

A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions in Embedded Computing Systems

سال: 2023

ISSN: ['1539-9087', '1558-3465']

DOI: https://doi.org/10.1145/3579823