Welcome to Journal of University of Chinese Academy of Sciences,Today is

Journal of University of Chinese Academy of Sciences ›› 2021, Vol. 38 ›› Issue (4): 494-502.DOI: 10.7523/j.issn.2095-6134.2021.04.008

• Research Articles • Previous Articles     Next Articles

Efficient machine learning methods for hardware Trojan detection using instruction-level power character

LI Ying1, CHEN Lan1,2, TONG Xin1   

  1. 1. Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029, China;
    2. Beijing Key Laboratory of Three-dimensional and Nanometer Integrated Circuit Design Automation Technology, Beijing 100029, China
  • Received:2019-09-26 Revised:2019-11-22 Online:2021-07-15
  • Supported by:
    Supported by Beijing Natural Science Foundation (4184106), National Internet of Things and Smart City Key Project Docking (Z181100003518002), Beijing Science and Technology Project (Z171100001117147)

Abstract: Integrated circuits (IC) are vulnerable to hardware Trojans (HTs) due to the globalization of semiconductor design and outsourcing fabrication. Stealthy HTs which activate malicious aging operations are ususlly hide in normal behaviors.Therefore, it is a challenge to detect those HTs by general test and verification approaches. In this paper, we build an efficient machine learning (ML) framework to classify the genuine and Trojan-insert chips using instruction-level side-channel power characters. Different instructions and HTs are used as feature sets to construct the algorithm models. In order to evaluate the performance of the method, we implemented five HTs benchmarks of MC8051 micro-controller in Altera Stratix II FPGA, and presented analysis on five formulated ML models in both supervised and unsupervised modes. The test results showed that the detection accuracy of supervised Naïve Bayes is 95% in average, which is the highest among the ML models. The supervised SVM consumed the shortest running time, with an average of 0.04 s. We also verified that one-class SVM can be a valuable method without golden reference, which has accuracy in the range from 17% to 72% even in Harsh learning condition.

Key words: hardware Trojans, machine learning, side-channel power, instruction-level, detection

CLC Number: