Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search

被引:0
|
作者
Mezzarapa, Franco [1 ]
Goodrich, Jenna [1 ]
Robins, Andey [1 ]
Borowczak, Mike [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
来源
关键词
Side Channels; Hardware Trojan; Power Analysis; Deep Neural Network;
D O I
10.1007/978-3-031-81900-1_11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This work presents a model hardware trojan which intermittently is capable of corrupting an encryption operation occurring on a device. It asks whether this trojan can be detected via power-based, side-channel attacks only instrumenting the encryption itself, not the control flow of the trojan itself. By applying Automated Machine Learning techniques to search neural architecture, a classification of corrupted encryption operations is able to completely identify whether the operation corresponded with a corrupted operation or not. Through a number of experiments, we demonstrate this fact holds regardless of variable or constant plaintext, rotating encryption keys, or even with different corrupted keys.
引用
收藏
页码:175 / 185
页数:11
相关论文
共 50 条
  • [41] APNAS: Accuracy-and-Performance-Aware Neural Architecture Search for Neural Hardware Accelerators
    Achararit, Paniti
    Hanif, Muhammad Abdullah
    Putra, Rachmad Vidya Wicaksana
    Shafique, Muhammad
    Hara-Azumi, Yuko
    IEEE ACCESS, 2020, 8 : 165319 - 165334
  • [42] Hardware Trojan Detection for Gate-level Netlists Based on Graph Neural Network
    Shi J.
    Wen C.
    Liu H.
    Wang Z.
    Zhang S.
    Peijun M.A.
    Kang L.I.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3253 - 3262
  • [43] Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
    Fu, Weimin
    Yu, Honggang
    Arias, Orlando
    Yang, Kaichen
    Jin, Yier
    Yavuz, Tuba
    Guo, Xiaolong
    Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI, 2022, : 481 - 486
  • [44] A power traces based hardware trojan detection using deep artificial neural network
    Mohanraj, Priyadharshini
    Paramasivam, Saravanan
    Sathyamoorthy, Prashanth
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2025, 123 (01)
  • [45] Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
    Fu, Weimin
    Yu, Honggang
    Arias, Orlando
    Yang, Kaichen
    Jin, Yier
    Yavuz, Tuba
    Guo, Xiaolong
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 481 - 486
  • [46] Multi-Objective Hardware Aware Neural Architecture Search using Hardware Cost Diversity
    Sinha, Nilotpal
    Rostami, Peyman
    Shabayek, Abd El Rahman
    Kacem, Anis
    Aouada, Djamila
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW, 2024, : 8032 - 8039
  • [47] Neural Architecture Search Using Metaheuristics for Automated Cell Segmentation
    Kus, Zeki
    Aydin, Musa
    Kiraz, Berna
    Can, Burhanettin
    METAHEURISTICS, MIC 2022, 2023, 13838 : 158 - 171
  • [48] A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
    Gao, Yuchan
    Su, Jing
    Li, Jia
    Wang, Shenglong
    Li, Chao
    ETRI JOURNAL, 2024,
  • [49] EvoAAA: An evolutionary methodology for automated neural autoencoder architecture search
    Charte, Francisco
    Rivera, Antonio J.
    Martinez, Francisco
    del Jesus, Maria J.
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2020, 27 (03) : 211 - 231
  • [50] Automated Dominative Subspace Mining for Efficient Neural Architecture Search
    Chen, Yaofo
    Guo, Yong
    Liao, Daihai
    Lv, Fanbing
    Song, Hengjie
    Kwok, James Tin-Yau
    Tan, Mingkui
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (10) : 9281 - 9297