Cargando…
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection
The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and ther...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302022/ https://www.ncbi.nlm.nih.gov/pubmed/37420671 http://dx.doi.org/10.3390/s23125503 |
_version_ | 1785064950814736384 |
---|---|
author | Dong, Chen Yao, Yinan Xu, Yi Liu, Ximeng Wang, Yan Zhang, Hao Xu, Li |
author_facet | Dong, Chen Yao, Yinan Xu, Yi Liu, Ximeng Wang, Yan Zhang, Hao Xu, Li |
author_sort | Dong, Chen |
collection | PubMed |
description | The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and there are many mature commercial products, such as antivirus software, firewalls, etc. In stark contrast, the research community on governing malicious hardware is still in its infancy. Chips are the core component of hardware, and hardware Trojans are the primary and complex security issue faced by chips. Detection of hardware Trojans is the first step for dealing with malicious circuits. Due to the limitation of the golden chip and the computational consumption, the existing traditional detection methods are not applicable to very large-scale integration. The performances of traditional machine-learning-based methods depend on the accuracy of the multi-feature representation, and most of the methods may lead to instability because of the difficulty of extracting features manually. In this paper, employing deep learning, a multiscale detection model for automatic feature extraction is proposed. The model is called MHTtext and provides two strategies to balance the accuracy and computational consumption. After selecting a strategy according to the actual situations and requirements, the MHTtext generates the corresponding path sentences from the netlist and employs TextCNN for identification. Further, it can also obtain non-repeated hardware Trojan component information to improve its stability performance. Moreover, a new evaluation metric is established to intuitively measure the model’s effectiveness and balance: the stabilization efficiency index (SEI). In the experimental results for the benchmark netlists, the average accuracy (ACC) in the TextCNN of the global strategy is as high as 99.26%, and one of its stabilization efficiency index values ranks first with a score of 71.21 in all comparison classifiers. The local strategy also achieved an excellent effect, according to the SEI. The results show that the proposed MHTtext model has high stability, flexibility, and accuracy, in general. |
format | Online Article Text |
id | pubmed-10302022 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103020222023-06-29 A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection Dong, Chen Yao, Yinan Xu, Yi Liu, Ximeng Wang, Yan Zhang, Hao Xu, Li Sensors (Basel) Article The Cyber-Physical System and even the Metaverse will become the second space in which human beings live. While bringing convenience to human beings, it also brings many security threats. These threats may come from software or hardware. There has been a lot of research on managing malware, and there are many mature commercial products, such as antivirus software, firewalls, etc. In stark contrast, the research community on governing malicious hardware is still in its infancy. Chips are the core component of hardware, and hardware Trojans are the primary and complex security issue faced by chips. Detection of hardware Trojans is the first step for dealing with malicious circuits. Due to the limitation of the golden chip and the computational consumption, the existing traditional detection methods are not applicable to very large-scale integration. The performances of traditional machine-learning-based methods depend on the accuracy of the multi-feature representation, and most of the methods may lead to instability because of the difficulty of extracting features manually. In this paper, employing deep learning, a multiscale detection model for automatic feature extraction is proposed. The model is called MHTtext and provides two strategies to balance the accuracy and computational consumption. After selecting a strategy according to the actual situations and requirements, the MHTtext generates the corresponding path sentences from the netlist and employs TextCNN for identification. Further, it can also obtain non-repeated hardware Trojan component information to improve its stability performance. Moreover, a new evaluation metric is established to intuitively measure the model’s effectiveness and balance: the stabilization efficiency index (SEI). In the experimental results for the benchmark netlists, the average accuracy (ACC) in the TextCNN of the global strategy is as high as 99.26%, and one of its stabilization efficiency index values ranks first with a score of 71.21 in all comparison classifiers. The local strategy also achieved an excellent effect, according to the SEI. The results show that the proposed MHTtext model has high stability, flexibility, and accuracy, in general. MDPI 2023-06-11 /pmc/articles/PMC10302022/ /pubmed/37420671 http://dx.doi.org/10.3390/s23125503 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Dong, Chen Yao, Yinan Xu, Yi Liu, Ximeng Wang, Yan Zhang, Hao Xu, Li A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title | A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title_full | A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title_fullStr | A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title_full_unstemmed | A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title_short | A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection |
title_sort | cost-driven method for deep-learning-based hardware trojan detection |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302022/ https://www.ncbi.nlm.nih.gov/pubmed/37420671 http://dx.doi.org/10.3390/s23125503 |
work_keys_str_mv | AT dongchen acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT yaoyinan acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT xuyi acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT liuximeng acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT wangyan acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT zhanghao acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT xuli acostdrivenmethodfordeeplearningbasedhardwaretrojandetection AT dongchen costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT yaoyinan costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT xuyi costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT liuximeng costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT wangyan costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT zhanghao costdrivenmethodfordeeplearningbasedhardwaretrojandetection AT xuli costdrivenmethodfordeeplearningbasedhardwaretrojandetection |