Cargando…

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection

The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and ther...

Descripción completa

Detalles Bibliográficos
Autores principales: Dong, Chen, Yao, Yinan, Xu, Yi, Liu, Ximeng, Wang, Yan, Zhang, Hao, Xu, Li
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302022/
https://www.ncbi.nlm.nih.gov/pubmed/37420671
http://dx.doi.org/10.3390/s23125503
_version_ 1785064950814736384
author Dong, Chen
Yao, Yinan
Xu, Yi
Liu, Ximeng
Wang, Yan
Zhang, Hao
Xu, Li
author_facet Dong, Chen
Yao, Yinan
Xu, Yi
Liu, Ximeng
Wang, Yan
Zhang, Hao
Xu, Li
author_sort Dong, Chen
collection PubMed
description The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and there are many mature commercial products, such as antivirus software, firewalls, etc. In stark contrast, the research community on governing malicious hardware is still in its infancy. Chips are the core component of hardware, and hardware Trojans are the primary and complex security issue faced by chips. Detection of hardware Trojans is the first step for dealing with malicious circuits. Due to the limitation of the golden chip and the computational consumption, the existing traditional detection methods are not applicable to very large-scale integration. The performances of traditional machine-learning-based methods depend on the accuracy of the multi-feature representation, and most of the methods may lead to instability because of the difficulty of extracting features manually. In this paper, employing deep learning, a multiscale detection model for automatic feature extraction is proposed. The model is called MHTtext and provides two strategies to balance the accuracy and computational consumption. After selecting a strategy according to the actual situations and requirements, the MHTtext generates the corresponding path sentences from the netlist and employs TextCNN for identification. Further, it can also obtain non-repeated hardware Trojan component information to improve its stability performance. Moreover, a new evaluation metric is established to intuitively measure the model’s effectiveness and balance: the stabilization efficiency index (SEI). In the experimental results for the benchmark netlists, the average accuracy (ACC) in the TextCNN of the global strategy is as high as 99.26%, and one of its stabilization efficiency index values ranks first with a score of 71.21 in all comparison classifiers. The local strategy also achieved an excellent effect, according to the SEI. The results show that the proposed MHTtext model has high stability, flexibility, and accuracy, in general.
format Online
Article
Text
id pubmed-10302022
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103020222023-06-29 A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection Dong, Chen Yao, Yinan Xu, Yi Liu, Ximeng Wang, Yan Zhang, Hao Xu, Li Sensors (Basel) Article The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and there are many mature commercial products, such as antivirus software, firewalls, etc. In stark contrast, the research community on governing malicious hardware is still in its infancy. Chips are the core component of hardware, and hardware Trojans are the primary and complex security issue faced by chips. Detection of hardware Trojans is the first step for dealing with malicious circuits. Due to the limitation of the golden chip and the computational consumption, the existing traditional detection methods are not applicable to very large-scale integration. The performances of traditional machine-learning-based methods depend on the accuracy of the multi-feature representation, and most of the methods may lead to instability because of the difficulty of extracting features manually. In this paper, employing deep learning, a multiscale detection model for automatic feature extraction is proposed. The model is called MHTtext and provides two strategies to balance the accuracy and computational consumption. After selecting a strategy according to the actual situations and requirements, the MHTtext generates the corresponding path sentences from the netlist and employs TextCNN for identification. Further, it can also obtain non-repeated hardware Trojan component information to improve its stability performance. Moreover, a new evaluation metric is established to intuitively measure the model’s effectiveness and balance: the stabilization efficiency index (SEI). In the experimental results for the benchmark netlists, the average accuracy (ACC) in the TextCNN of the global strategy is as high as 99.26%, and one of its stabilization efficiency index values ranks first with a score of 71.21 in all comparison classifiers. The local strategy also achieved an excellent effect, according to the SEI. The results show that the proposed MHTtext model has high stability, flexibility, and accuracy, in general. MDPI 2023-06-11 /pmc/articles/PMC10302022/ /pubmed/37420671 http://dx.doi.org/10.3390/s23125503 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Dong, Chen
Yao, Yinan
Xu, Yi
Liu, Ximeng
Wang, Yan
Zhang, Hao
Xu, Li
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title_full A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title_fullStr A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title_full_unstemmed A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title_short A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
title_sort cost-driven method for deep-learning-based hardware trojan detection
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302022/
https://www.ncbi.nlm.nih.gov/pubmed/37420671
http://dx.doi.org/10.3390/s23125503
work_keys_str_mv AT dongchen acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT yaoyinan acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT xuyi acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT liuximeng acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT wangyan acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT zhanghao acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT xuli acostdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT dongchen costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT yaoyinan costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT xuyi costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT liuximeng costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT wangyan costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT zhanghao costdrivenmethodfordeeplearningbasedhardwaretrojandetection
AT xuli costdrivenmethodfordeeplearningbasedhardwaretrojandetection