{"title":"基于无监督学习的硬件木马自动检测:以FPGA为例","authors":"Shailesh Rajput, Jaya Dofe, Wafi Danesh","doi":"10.1109/ISQED57927.2023.10129335","DOIUrl":null,"url":null,"abstract":"Field programmable gate arrays (FPGAs) are widely used in critical applications such as industrial, medical, automotive, and military systems due to their ability to be dynamically reconfigured at runtime. However, this reconfigurability also presents security concerns, as FPGA designs are encoded in a bitstream that adversaries can target for design cloning, IP theft, or hardware Trojan insertion. This work presents a proof-of-concept for detecting hardware Trojans (HT) in FPGA using an unsupervised machine-learning method that eliminates the need for reference models of HT. The proposed method is based on transforming the configuration bitstream into an encoded vector, bypassing the need for netlist reconstruction and allowing for HT detection based solely on the extracted FPGA layout information. Our method was evaluated against various HT attack scenarios and accurately detected all infected bitstreams.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA\",\"authors\":\"Shailesh Rajput, Jaya Dofe, Wafi Danesh\",\"doi\":\"10.1109/ISQED57927.2023.10129335\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Field programmable gate arrays (FPGAs) are widely used in critical applications such as industrial, medical, automotive, and military systems due to their ability to be dynamically reconfigured at runtime. However, this reconfigurability also presents security concerns, as FPGA designs are encoded in a bitstream that adversaries can target for design cloning, IP theft, or hardware Trojan insertion. This work presents a proof-of-concept for detecting hardware Trojans (HT) in FPGA using an unsupervised machine-learning method that eliminates the need for reference models of HT. The proposed method is based on transforming the configuration bitstream into an encoded vector, bypassing the need for netlist reconstruction and allowing for HT detection based solely on the extracted FPGA layout information. Our method was evaluated against various HT attack scenarios and accurately detected all infected bitstreams.\",\"PeriodicalId\":315053,\"journal\":{\"name\":\"2023 24th International Symposium on Quality Electronic Design (ISQED)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 24th International Symposium on Quality Electronic Design (ISQED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISQED57927.2023.10129335\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 24th International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED57927.2023.10129335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA
Field programmable gate arrays (FPGAs) are widely used in critical applications such as industrial, medical, automotive, and military systems due to their ability to be dynamically reconfigured at runtime. However, this reconfigurability also presents security concerns, as FPGA designs are encoded in a bitstream that adversaries can target for design cloning, IP theft, or hardware Trojan insertion. This work presents a proof-of-concept for detecting hardware Trojans (HT) in FPGA using an unsupervised machine-learning method that eliminates the need for reference models of HT. The proposed method is based on transforming the configuration bitstream into an encoded vector, bypassing the need for netlist reconstruction and allowing for HT detection based solely on the extracted FPGA layout information. Our method was evaluated against various HT attack scenarios and accurately detected all infected bitstreams.