Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search

被引:0
|
作者
Mezzarapa, Franco [1 ]
Goodrich, Jenna [1 ]
Robins, Andey [1 ]
Borowczak, Mike [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
来源
关键词
Side Channels; Hardware Trojan; Power Analysis; Deep Neural Network;
D O I
10.1007/978-3-031-81900-1_11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work presents a model hardware trojan which intermittently is capable of corrupting an encryption operation occurring on a device. It asks whether this trojan can be detected via power-based, side-channel attacks only instrumenting the encryption itself, not the control flow of the trojan itself. By applying Automated Machine Learning techniques to search neural architecture, a classification of corrupted encryption operations is able to completely identify whether the operation corresponded with a corrupted operation or not. Through a number of experiments, we demonstrate this fact holds regardless of variable or constant plaintext, rotating encryption keys, or even with different corrupted keys.
引用
收藏
页码:175 / 185
页数:11
相关论文
共 50 条
  • [1] Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks
    Wu, Lingjuan
    Su, Hao
    Zhang, Xuelin
    Tai, Yu
    Li, Han
    Hu, Wei
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [2] AI Hardware Oriented Trojan Detection Architecture
    Takemoto, Shu
    Ikezaki, Yoshiya
    Nozaki, Yusuke
    Yoshikawa, Masaya
    ACM International Conference Proceeding Series, 2022, : 9 - 15
  • [3] Hardware Trojan Detection using Graph Neural Networks
    Yasaei, Rozhin
    Chen, Luke
    Yu, Shih-Yuan
    Faruque, Mohammad Abdullah Al
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, : 1 - 1
  • [4] Hardware Trojan Detection using Graph Neural Networks
    Yasaei, Rozhin
    Chen, Luke
    Yu, Shih-Yuan
    Al Faruque, Mohammad Abdullah
    arXiv, 2022,
  • [5] Key retrieval from AES architecture through hardware trojan horse
    Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Coimbatore, India
    不详
    Commun. Comput. Info. Sci., (483-494): : 483 - 494
  • [6] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [7] Hardware Trojan Detection Using Graph Neural Networks
    Yasaei, Rozhin
    Chen, Luke
    Yu, Shih-Yuan
    Al Faruque, Mohammad Abdullah
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 44 (01) : 25 - 38
  • [8] Neural Architecture Search Survey: A Hardware Perspective
    Chitty-Venkata, Krishna Teja
    Somani, Arun K.
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [9] A Neural Architecture Search for Automated Multimodal
    Singh, Anuraj
    Nair, Haritha
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 207
  • [10] Neural networks & logistic regression for FPGA hardware Trojan detection
    Pazira, Milad
    Baleghi, Yasser
    Mahmoodpour, Mohammad-Ali
    Jafari, Hossein
    2023 5TH IRANIAN INTERNATIONAL CONFERENCE ON MICROELECTRONICS, IICM, 2023, : 82 - 85