[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/3130379.3130447guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

Power profiling of microcontroller's instruction set for runtime hardware trojans detection without golden circuit models

Published: 27 March 2017 Publication History

Abstract

Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of ICs against hardware Trojans (HT). Recently, several side channel parameters based techniques have been developed to detect these hardware Trojans that require golden circuit as a reference model, but due to the widespread usage of IPs, most of the system-on-chip (SoC) do not have a golden reference. Hardware Trojans in intellectual property (IP)-based SoC designs are considered as major concern for future integrated circuits. Most of the state-of-the-art runtime hardware Trojan detection techniques presume that Trojans will lead to anomaly in the SoC integration units. In this paper, we argue that an intelligent intruder may intrude the IP-based SoC without disturbing the normal SoC operation or violating any protocols. To overcome this limitation, we propose a methodology to extract the power profile of the micro-controllers instruction sets, which is in turn used to train a machine learning algorithm. In this technique, the power profile is obtained by extracting the power behavior of the micro-controllers for different assembly language instructions. This trained model is then embedded into the integrated circuits at the SoC integration level, which classifies the power profile during runtime to detect the intrusions. We applied our proposed technique on MC8051 micro-controller in VHDL, obtained the power profile of its instruction set and then applied deep learning, k-NN, decision tree and naive Bayesian based machine learning tools to train the models. The cross validation comparison of these learning algorithm, when applied to MC8051 Trojan benchmarks, shows that we can achieve 87% to 99% accuracy. To the best of our knowledge, this is the first work in which the power profile of a microprocessor's instruction set is used in conjunction with machine learning for runtime HT detection.

References

[1]
M. Tehranipoor, "A survey of hardware trojan taxonomy and detection," Design & Test Computer, vol. 27, no. 1, pp. 10--25, 2010.
[2]
H. Li, Q. Liu, J. Zhang, and Y. Lyu, "A survey of hardware trojan detection, diagnosis and prevention," in Conference on Computer-Aided Design and Computer Graphics, 2015, pp. 173--180.
[3]
A. Gbade-Alabi, D. Keezer, V. Mooney, A. Y. Poschmann, M. Stöttinger, and K. Divekar, "A signature based architecture for trojan detection," in Embedded Systems Security, 2014, p. 3.
[4]
F. K. Lodhi, S. R. Hasan, O. Hasan, and F. Awwad, "Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (msma) pipeline," in Midwest Symposium on Circuits and Systems, 2014, pp. 659--662.
[5]
S. Bhunia, M. Abramovici, D. Agrawal, p. Bradley, M. S. Hsiao, J. Plusquellic, and M. Tehranipoor, "Protection against hardware trojan attacks: Towards a comprehensive solution," Design & Test, vol. 30, no. 3, pp. 6--17, 2013.
[6]
X. Cui, K. Ma, L. Shi, and K. Wu, "High-level synthesis for run-time hardware Trojan detection and recovery," in Design Automation Conference, 2014, pp. 157:1--157:6.
[7]
M. Hicks, M. Finnicum, S. King, M. Martin, and J. Smith, "Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically," in Security and Privacy, 2010, pp. 159--172.
[8]
D. Forte, C. Bao, and A. Srivastava, "Temperature tracking: An innovative run-time approach for hardware Trojan detection," in Conference on Computer-Aided Design, 2013, pp. 532--539.
[9]
C. Bao, D. Forte, and A. Srivastava, "Temperature tracking: Toward robust run-time detection of hardware Trojans," Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 10, pp. 1577--1585, 2015.
[10]
H. Zhao, K. Kwiat, C. Kamhoua, and M. Rodriguez, "Applying chaos theory for runtime hardware trojan detection," in Computational Intelligence for Security and Defense Applications, 2015, pp. 1--6.
[11]
C. Bao, D. Forte, and A. Srivastava, "On application of one-class svm to reverse engineering-based hardware trojan detection," in Quality Electronic Design, 2014, pp. 47--54.
[12]
C. Bao, D. Forte, and A. Srivastava, "On reverse engineering-based hardware trojan detection," Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 1, pp. 49--57, 2016.
[13]
F. K. Lodhi, I. Abbasi, F. Khalid, O. Hasan, F. Awwad, and S. R. Hasan, "A self-learning framework to detect the intruded integrated circuits," in International Symposium on Circuits and Systems, 2016, pp. 1702--1705.
[14]
T. Iwase, Y. Nozaki, M. Yoshikawa, and T. Kumaki, "Detection technique for hardware trojans using machine learning in frequency domain," in Global Conference on Consumer Electronics, 2015, pp. 185--186.
[15]
A. Kulkarni, Y. Pino, and T. Mohsenin, "Adaptive real-time trojan detection framework through machine learning," in Hardware Oriented Security and Trust, 2016, pp. 120--123.
[16]
A. Kulkarni, Y. Pino, and T. Mohsenin, "Svm-based real-time hardware trojan detection for many-core platform," in International Symposium on Quality Electronic Design, 2016, pp. 362--367.
[17]
M. Tehranipoor and H. Salamani, "trust-HUB," 2016. {Online}. Available: https://www.trust-hub.org/
[18]
M. A. Mazidi, J. G. Mazidi, and R. D. McKinlay, The 8051 microcontroller and embedded systems: using Assembly and C. Pearson/Prentice Hall, 2006, vol. 626.
[19]
F. Pernkopf, "Bayesian network classifiers versus selective k-nn classifier," Pattern Recognition, vol. 38, no. 1, pp. 1--10, 2005.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DATE '17: Proceedings of the Conference on Design, Automation & Test in Europe
March 2017
1814 pages

Publisher

European Design and Automation Association

Leuven, Belgium

Publication History

Published: 27 March 2017

Author Tags

  1. assembly language instructions
  2. hardware trojans
  3. machine learning
  4. microcontroller
  5. power profiling
  6. runtime detection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 86
    Total Downloads
  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)2
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media