Bharti Dakhale, K. Vipinkumar, Kalla Narotham, Shantanu Kadam, Ankit A. Bhurane, Ashwin Kothari
{"title":"基于功率侧信道分析和VGG-Net的硬件木马自动检测","authors":"Bharti Dakhale, K. Vipinkumar, Kalla Narotham, Shantanu Kadam, Ankit A. Bhurane, Ashwin Kothari","doi":"10.1109/PCEMS58491.2023.10136083","DOIUrl":null,"url":null,"abstract":"With the expanding usage of electronic devices such as smartphones and smartwatches in daily life, the need for advanced Integrated Circuits (ICs) is also increasing. Corporations are compelled to outsource IC design and production to several third-party vendors to keep up with demand. This has allowed adversaries to make unauthorized modifications to the circuits. As a result, malicious adversaries have been able to deploy Hardware Trojans (HTs), similar to software viruses, as they may cause data leakage and circuit disruption. The currently known methods for HT detection rely on expensive and often impractical destructive methods like reverse engineering or non-destructive methods like comparison with the golden chip. In this paper, we propose a method for detecting HTs based on the VGG-Net architecture. The model has an accuracy of 93%, 87%, 100%, 100%, and 76% on the Advanced Encryption Standard (AES) benchmarks of T500, T600, T700, T800, and T1600, respectively, for an average accuracy of 91.2%. It surpasses existing state-of-the-art models in the AES-T600, AES-T700, AES-T800, and AES-T1600 benchmarks.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automated Detection of Hardware Trojans using Power Side-Channel Analysis and VGG-Net\",\"authors\":\"Bharti Dakhale, K. Vipinkumar, Kalla Narotham, Shantanu Kadam, Ankit A. Bhurane, Ashwin Kothari\",\"doi\":\"10.1109/PCEMS58491.2023.10136083\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the expanding usage of electronic devices such as smartphones and smartwatches in daily life, the need for advanced Integrated Circuits (ICs) is also increasing. Corporations are compelled to outsource IC design and production to several third-party vendors to keep up with demand. This has allowed adversaries to make unauthorized modifications to the circuits. As a result, malicious adversaries have been able to deploy Hardware Trojans (HTs), similar to software viruses, as they may cause data leakage and circuit disruption. The currently known methods for HT detection rely on expensive and often impractical destructive methods like reverse engineering or non-destructive methods like comparison with the golden chip. In this paper, we propose a method for detecting HTs based on the VGG-Net architecture. The model has an accuracy of 93%, 87%, 100%, 100%, and 76% on the Advanced Encryption Standard (AES) benchmarks of T500, T600, T700, T800, and T1600, respectively, for an average accuracy of 91.2%. It surpasses existing state-of-the-art models in the AES-T600, AES-T700, AES-T800, and AES-T1600 benchmarks.\",\"PeriodicalId\":330870,\"journal\":{\"name\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PCEMS58491.2023.10136083\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCEMS58491.2023.10136083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automated Detection of Hardware Trojans using Power Side-Channel Analysis and VGG-Net
With the expanding usage of electronic devices such as smartphones and smartwatches in daily life, the need for advanced Integrated Circuits (ICs) is also increasing. Corporations are compelled to outsource IC design and production to several third-party vendors to keep up with demand. This has allowed adversaries to make unauthorized modifications to the circuits. As a result, malicious adversaries have been able to deploy Hardware Trojans (HTs), similar to software viruses, as they may cause data leakage and circuit disruption. The currently known methods for HT detection rely on expensive and often impractical destructive methods like reverse engineering or non-destructive methods like comparison with the golden chip. In this paper, we propose a method for detecting HTs based on the VGG-Net architecture. The model has an accuracy of 93%, 87%, 100%, 100%, and 76% on the Advanced Encryption Standard (AES) benchmarks of T500, T600, T700, T800, and T1600, respectively, for an average accuracy of 91.2%. It surpasses existing state-of-the-art models in the AES-T600, AES-T700, AES-T800, and AES-T1600 benchmarks.