A Few Shot Learning based Approach for Hardware Trojan Detection using Deep Siamese CNN

被引:8
|
作者
Sharma, Richa [1 ]
Sharma, G. K. [1 ]
Pattanaik, Manisha [1 ]
机构
[1] ABV Indian Inst Informat Technol & Management, Gwalior 474015, Madhya Pradesh, India
关键词
Hardware Trojan; Layout images; Machine learning; CNN; Few shot learning;
D O I
10.1109/VLSID51830.2021.00033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is the primary concern for the semiconductor industries due to the involvement of external vendors in the integrated circuit (IC) design. Recently various Machine learning (ML) based HT detection techniques have been reported to automate the detection process. However, the major problem of applying ML algorithms in HT detection is the lack of standard large IC dataset, lack of relevant features, and class imbalance, which largely affects the detection performance. Therefore, this paper proposes a new HT detection technique, based on a few-shot learning and Deep Siamese CNN model that detects the HT from IC layout images. A new DCNN model-based architecture is proposed, which contains three convolutional and pooling layers that automatically extracts the invariant and relevant features from the IC images. Further, a new architecture based on the deep Siamese CNN (DSCNN) model is also proposed, which utilizes the same DCNN model twice and generates the similarity score based on the extracted image features for detection. The proposed DSCNN model is initially trained with a small synthetic ISCAS-85 dataset and then validated and tested with the unseen ISCAS-89 and Trust-Hub datasets, containing few samples per class. Finally, a new HT detection algorithm is proposed, which utilizes the two proposed models to perform the detection. Experimental results on synthetic ISCAS-89 and Trust-Hub datasets shows that the proposed technique achieves high detection accuracy in the presence of a few samples.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 50 条
  • [1] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182
  • [2] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman, A.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182
  • [3] A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning
    Yao, Yinan
    Dong, Chen
    Xie, Zhengye
    Li, Yuqing
    Guo, Xiaodong
    Yang, Yang
    Wang, Xiaoding
    ACM International Conference Proceeding Series, 2023, : 69 - 76
  • [4] Hardware Trojan detection algorithm based on deep learning
    Liu Z.
    Zhang M.
    Chi Y.
    Li Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (06): : 37 - 45
  • [5] A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data
    Nasr, Abdurrahman
    Mohamed, Khalil
    Elshenawy, Ayman
    Zaki, Mohamed
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [6] Research for Defect Detection based on Few-Shot Learning of Siamese Network
    Tong, Guowei
    Chen, Chaoying
    Peng, Qi
    Shen, Hongping
    Huang, Linyi
    Hu, Xianghong
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 835 - 838
  • [7] Detection of Hardware Trojan Horse using Unsupervised Learning Approach
    Samyukta, K.
    Ramesh, S.R.
    2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82
  • [8] A Deep Learning Method Based on the Attention Mechanism for Hardware Trojan Detection
    Tang, Wenjing
    Su, Jing
    He, Jiaji
    Gao, Yuchan
    ELECTRONICS, 2022, 11 (15)
  • [9] Anomaly Detection Using Siamese Network with Attention Mechanism for Few-Shot Learning
    Takimoto, Hironori
    Seki, Junya
    Situju, Sulfayanti F.
    Kanagawa, Akihiro
    APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [10] A Few-shot Deep Learning Approach for Improved Intrusion Detection
    Chowdhury, Md Moin Uddin
    Hammond, Frederick
    Konowicz, Glenn
    Xin, Chunsheng
    Wu, Hongyi
    Li, Jiang
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 456 - +