IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER

Q3 Economics, Econometrics and Finance Applied Computer Science Pub Date : 2021-12-30 DOI:10.35784/acs-2021-26
Kadeejah Abdulsalam, J. Adebisi, Victor Durojaiye
{"title":"IMPLEMENTATION OF A HARDWARE TROJAN CHIP DETECTOR MODEL USING ARDUINO MICROCONTROLLER","authors":"Kadeejah Abdulsalam, J. Adebisi, Victor Durojaiye","doi":"10.35784/acs-2021-26","DOIUrl":null,"url":null,"abstract":"These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and accessing the level of damage to devices is considered in this work. These trojans, when present in sensitive hardware system deployment, tends to have potential damage and infection to the system. This research builds a hardware trojan detector using machine learning techniques. The work uses a combination of logic testing and power side-channel analysis (SCA) coupled with machine learning for power traces. The model was trained, validated and tested using the acquired data, for 5 epochs. Preliminary logic tests were conducted on target hardware device as well as power SCA. The designed machine learning model was implemented using Arduino microcontroller and result showed that the hardware trojan detector identifies trojan chips with a reliable accuracy. The power consumption readings of the hardware characteristically start at 1035-1040mW and the power time-series data were simulated using DC power measurements mixed with additive white Gaussian noise (AWGN) with different standard deviations. The model achieves accuracy, precision and accurate recall values. Setting the threshold proba¬bility for the trojan class less than 0.5 however increases the recall, which is the most important metric for overall accuracy acheivement of over 95 percent after several epochs of training.","PeriodicalId":36379,"journal":{"name":"Applied Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35784/acs-2021-26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Economics, Econometrics and Finance","Score":null,"Total":0}
引用次数: 0

Abstract

These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such alterations and accessing the level of damage to devices is considered in this work. These trojans, when present in sensitive hardware system deployment, tends to have potential damage and infection to the system. This research builds a hardware trojan detector using machine learning techniques. The work uses a combination of logic testing and power side-channel analysis (SCA) coupled with machine learning for power traces. The model was trained, validated and tested using the acquired data, for 5 epochs. Preliminary logic tests were conducted on target hardware device as well as power SCA. The designed machine learning model was implemented using Arduino microcontroller and result showed that the hardware trojan detector identifies trojan chips with a reliable accuracy. The power consumption readings of the hardware characteristically start at 1035-1040mW and the power time-series data were simulated using DC power measurements mixed with additive white Gaussian noise (AWGN) with different standard deviations. The model achieves accuracy, precision and accurate recall values. Setting the threshold proba¬bility for the trojan class less than 0.5 however increases the recall, which is the most important metric for overall accuracy acheivement of over 95 percent after several epochs of training.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用ARDUINO微控制器实现硬件木马芯片检测模型
如今,硬件设备及其相关活动受到各种技术威胁的极大影响。硬件特洛伊木马是对集成电路电路进行的恶意修改。本工作考虑利用这种修改并访问设备的损坏程度。当这些木马出现在敏感的硬件系统部署中时,往往会对系统造成潜在的损坏和感染。本研究利用机器学习技术构建了一个硬件木马检测器。这项工作结合了逻辑测试和功率侧通道分析(SCA)以及功率跟踪的机器学习。使用获取的数据对该模型进行了5个时期的训练、验证和测试。对目标硬件设备以及电源SCA进行了初步逻辑测试。使用Arduino微控制器实现了所设计的机器学习模型,结果表明,硬件木马检测器能够准确识别木马芯片。硬件的功耗读数从1035-1040mW开始,功率时间序列数据使用混合了不同标准偏差的加性高斯白噪声(AWGN)的直流功率测量进行模拟。该模型实现了准确度、精确度和准确的召回值。然而,将特洛伊木马类的阈值概率设置为小于0.5会增加召回率,这是在几个时期的训练后获得超过95%的总体准确率的最重要指标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Applied Computer Science
Applied Computer Science Engineering-Industrial and Manufacturing Engineering
CiteScore
1.50
自引率
0.00%
发文量
0
审稿时长
8 weeks
期刊最新文献
COMPARISON AND EVALUATION OF LMS-DERIVED ALGORITHMS APPLIED ON ECG SIGNALS CONTAMINATED WITH MOTION ARTIFACT DURING PHYSICAL ACTIVITIES OPTIMIZING UNMANNED AERIAL VEHICLE BASED FOOD DELIVERY THROUGH VEHICLE ROUTING PROBLEM: A COMPARATIVE ANALYSIS OF THREE DELIVERY SYSTEMS. FILTERING STRATEGIES FOR SMARTPHONE EMITTED DIGITAL SIGNALS ENHANCING MEDICAL DATA SECURITY IN E-HEALTH SYSTEMS USING BIOMETRIC-BASED WATERMARKING ANALYZING THE ROLE OF COMPUTER SCIENCE IN SHAPING MODERN ECONOMIC AND MANAGEMENT PRACTICES. BIBLIOMETRIC ANALYSIS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1